<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.17 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-steele-spice-profiles-bcp-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="DCP-BCP">Digital Credential Profiles Best Current Practices</title>
    <seriesInfo name="Internet-Draft" value="draft-steele-spice-profiles-bcp-01"/>
    <author fullname="Orie Steele">
      <organization>Transmute</organization>
      <address>
        <email>orie@transmute.industries</email>
      </address>
    </author>
    <author fullname="Michael Prorock">
      <organization>mesur.io</organization>
      <address>
        <email>mprorock@mesur.io</email>
      </address>
    </author>
    <author fullname="Mahmoud Alkhraishi">
      <organization>mavennet</organization>
      <address>
        <email>mahmoud@mavennet.com</email>
      </address>
    </author>
    <date year="2024" month="June" day="17"/>
    <area>Security</area>
    <workgroup>Secure Patterns for Internet CrEdentials</workgroup>
    <keyword>digitial credentials</keyword>
    <keyword>data model profiles</keyword>
    <keyword>policy guidance</keyword>
    <abstract>
      <?line 53?>

<t>Digital Credentials are frequently modeled on documents, forms, and messages
that enable a holder to prove they have attributes that are acceptable to a verifier.</t>
      <t>This document provides guidance to verifiers enabling them to describe their requirements
such that they can be translated into digital credential profiles.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://OR13.github.io/draft-steele-spice-profiles-bcp/draft-steele-spice-profiles-bcp.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-steele-spice-profiles-bcp/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Patterns for Internet CrEdentials Working Group mailing list (<eref target="mailto:spice@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spice/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spice/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/OR13/draft-steele-spice-profiles-bcp"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Verifiers have digital credential requirements that reduce their liability,
improve their transaction throughput, comply with local, regional, or international
laws, and support their environmental, social and governance objectives and values.</t>
      <t>Requirements are often expressed as "Policy Documents", and furnished to holders,
to enable them to easily comply. For example, sometimes to receive a new
credential, a holder may need to present one or more existing credentials, and
different regional agencies might have unique requirements regarding the quality,
age, and issuing authority of these credentials.</t>
      <t>Not all the attributes of a credential may be necessary to disclose, and the details
of the serialization are often less relevant to the verifier than
the authenticity and integrity of the credential attributes.</t>
      <t>Verifiers need to update their policies as new credential formats become
available, but still need to ensure that mandatory attributes are disclosed,
even while changing the securing mechanisms and serialization details.</t>
      <t>Depending on how a verifier wrote their policy, the process of updating it
to take advantage of new capabilities, safer cryptography,
smaller message sizes, or advances in data minimization, can be difficult.</t>
      <t>This document provides guidance to policy writers, enabling them to construct
policies that can be translated into human and machine verifiable profiles,
enabling digital credential formats to evolve with the speed and precision
at which policies can be written. It strives to concretely provide a means for
"improving ways of working between policy experts and technical experts"
<eref target="https://datatracker.ietf.org/doc/html/draft-hoffmann-gendispatch-policy-stakeholders-03">Policy experts are IETF stakeholders</eref></t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<dl>
        <dt>Ontology:</dt>
        <dd>
          <t>a set of concepts and categories in a subject area or domain that shows their properties and the relations between them. (oxford dictionary citation fixme)</t>
        </dd>
      </dl>
    </section>
    <section anchor="ontologies">
      <name>Ontologies</name>
      <t>Verifiers can share their view of a subject area or domain by acknowledging or leveraging ontologies.
Ontologies can be leveraged to model information requirements, with or without requiring the data
format to explicitly encode the ontology or leverage the ontology directly in the construction of
digital credentials.</t>
      <t>For example, the ontology defined in <xref target="I-D.draft-petithuguenin-rfc-ontology"/> can be used to describe the information
required in a digital credential for RFCs, without requiring the digital credential to contain
the literal strings used to serialize the ontology, for example the string: "ftp://shalmaneser.org/rfc#area",
need not be present, so long as the verifier describes that the string "area" is equivalent in their
profile text.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> distinguish between the information they require,
and the ontologies that can express the concepts needed to understand the information.</t>
    </section>
    <section anchor="information-vs-data">
      <name>Information vs Data</name>
      <t>Information is abstract, we can express the same information in many different ways, including in many different serializations.</t>
      <t>The following statement for example, expresses information:</t>
      <artwork><![CDATA[
Alice believes Bob is 42 years old.
]]></artwork>
      <t>That can also be expressed in different data structures, while preserving the information:</t>
      <t>in JSON:</t>
      <sourcecode type="json"><![CDATA[
{
  "alice": {
    "knows": {
      "bob": {
        "age": {
          "42": "years"
        }
      }
    }
  }
}
]]></sourcecode>
      <t>Verifiers can write policies that mandate a single method to encode information in a serialization
and allow only one serialization. This can reduce both the cost to implement and the attack surface
associated with the digital credentials that are acceptable to the verifier.</t>
      <t>However, if a new serialization is invented, that is simpler to support, and more directly aligns
with the values of the verifier and their mission objectives, having such a policy could prevent the
verifier from adopting the new and improved serialization, even if it secures the same information
and provides additional benefits, beyond integrity and authenticity, such as compactness, reduced
computation and storage costs, or safer formal modeling capabilities.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> distinguish between the information they require,
and the acceptable serializations that can express this information required.</t>
    </section>
    <section anchor="schema-vs-definition">
      <name>Schema vs Definition</name>
      <t>Once a verifier has documented their information requirements, and selected data formats
capable of expressing the required information while satisfying their policies and values,
the details of the acceptable data format <bcp14>SHOULD</bcp14> be considered.</t>
      <t>There are a number of subtle details regarding octet encodings that can lead to security
or performance issues in digital credential formats.</t>
      <t>For example, understanding the allowed data types for expressing information, be it an integer,
a floating point number, a string, or a boolean value.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> describe the allowed data types for the expression of information,
and <bcp14>SHOULD NOT</bcp14> support polymorphic types.</t>
      <t>Schema or data definition languages such as <xref target="RFC8610"/> <bcp14>SHOULD</bcp14> be used when describing
acceptable expressions of information models, so that validation of data instances
can be automated.</t>
    </section>
    <section anchor="designing-data-structures">
      <name>Designing Data Structures</name>
      <t>Although schema or data definition languages can help address some common security issues
such as validation as described in <xref target="RFC4949"/>, there are still problematic
expressions of information which should generally be avoided even when fully specifying data.</t>
      <t>Most commonly deeply nested data structures, or lists of deeply nested data structures containing lists.</t>
      <t>Most digital credentials are about asserting attributes of a subject, in a way that is secured by the issuer,
and provable by the holder.</t>
      <t>This can naturally be expressed using a simple map data type.</t>
      <sourcecode type="cddl"><![CDATA[
subject-attributes = {
  ; identifier
  ? &(id: 1) => int,
  ; age
  ? &(age: 2) => int,
}
]]></sourcecode>
      <t>Strings and arbitrary length data structures <bcp14>SHOULD</bcp14> be avoided, whenever possible.</t>
      <t>As the issuer secures the data, the interpretation of the data is always in the context of:</t>
      <ol spacing="normal" type="1"><li>
          <t>the definitions published by the issuer.</t>
        </li>
        <li>
          <t>the data the issuer chose to secure that expresses the information.</t>
        </li>
      </ol>
      <t>Policy writers <bcp14>SHOULD</bcp14> leverage tabular data structures (tables, csv) whenever possible.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> externalize definitions of data structures wherever possible, and use those
external definitions to generate relevant sections of the policy document.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> ensure that output documents are computer readable, and that when tabular data is
embedded in a policy document, that it is clearly separated from other sections of tabular data.</t>
      <t>Documents <bcp14>SHOULD</bcp14> be sectioned by logical concepts, and document sections dealing with the description of
data structures <bcp14>SHOULD</bcp14> be clearly identifed and not mixed with other data structure descriptions without
clear separation.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> clearly version policy documents, and <bcp14>SHOULD</bcp14> clearly identify the date
of publication, start date of applicabiilty of the policy, and if known, the end date of
applicability.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> clearly define the scope of the policy, and the audience to which the
policy applies to. These scope and audience definitions <bcp14>SHOULD</bcp14> take place in their own sections.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> restrict what data is expressed in a digital credential and how the data is expressed
not just the information that is required to be present.</t>
      <t>Policy writers <bcp14>SHOULD</bcp14> avoid making recommendations where the same information may be conveyed in many different,
but equivalent data structures. When leveraging CBOR, <xref target="I-D.draft-ietf-cbor-cde"/> <bcp14>SHOULD</bcp14> be used.</t>
      <t>Policy writers should avoid creating "frameworks" where interoperability is not immediately available <xref target="RFC9518"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
      <section anchor="cryptographic-agility">
        <name>Cryptographic Agility</name>
        <t>TODO Cryptographic Agility</t>
        <t>Registries /  Pick at least 2, use at least N bit security... avoid <bcp14>MUST</bcp14> support.... recommend AT LEAST support.</t>
      </section>
      <section anchor="internationalized-names">
        <name>Internationalized Names</name>
        <t>TODO Internationalized Names
Strings / domain names... Unicode.</t>
      </section>
      <section anchor="exploiting-data-validation">
        <name>Exploiting Data Validation</name>
        <t>Max depth exceeded in JSON, cannonicalization timeout in XML / JSON-LD, similar issues with large CBOR structures.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey"/>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC8610">
          <front>
            <title>Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="C. Vigano" initials="C." surname="Vigano"/>
            <author fullname="C. Bormann" initials="C." surname="Bormann"/>
            <date month="June" year="2019"/>
            <abstract>
              <t>This document proposes a notational convention to express Concise Binary Object Representation (CBOR) data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR or JSON.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8610"/>
          <seriesInfo name="DOI" value="10.17487/RFC8610"/>
        </reference>
        <reference anchor="RFC9518">
          <front>
            <title>Centralization, Decentralization, and Internet Standards</title>
            <author fullname="M. Nottingham" initials="M." surname="Nottingham"/>
            <date month="December" year="2023"/>
            <abstract>
              <t>This document discusses aspects of centralization that relate to Internet standards efforts. It argues that, while standards bodies have a limited ability to prevent many forms of centralization, they can still make contributions that assist in the decentralization of the Internet.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9518"/>
          <seriesInfo name="DOI" value="10.17487/RFC9518"/>
        </reference>
        <reference anchor="I-D.draft-ietf-cbor-cde">
          <front>
            <title>CBOR Common Deterministic Encoding (CDE)</title>
            <author fullname="Carsten Bormann" initials="C." surname="Bormann">
              <organization>Universität Bremen TZI</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>   CBOR (STD 94, RFC 8949) defines "Deterministically Encoded CBOR" in
   its Section 4.2, providing some flexibility for application specific
   decisions.  To facilitate Deterministic Encoding to be offered as a
   selectable feature of generic encoders, the present document defines
   a CBOR Common Deterministic Encoding (CDE) Profile that can be shared
   by a large set of applications with potentially diverging detailed
   requirements.

   This document also introduces the concept of Application Profiles,
   which are layered on top of the CBOR CDE Profile and can address more
   application specific requirements.  Application Profiles are defined
   in separate documents.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-cbor-cde-02"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.draft-petithuguenin-rfc-ontology">
          <front>
            <title>An Ontology for RFCs</title>
            <author fullname="Marc Petit-Huguenin" initials="M." surname="Petit-Huguenin">
              <organization>Impedance Mismatch LLC</organization>
            </author>
            <date day="20" month="January" year="2024"/>
            <abstract>
              <t>   This document defines an ontology that describes the specifications
   published by the RFC Editor, together with ancillary documents.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-petithuguenin-rfc-ontology-04"/>
        </reference>
      </references>
    </references>
    <?line 277?>

<section anchor="informative-references">
      <name>Informative References</name>
      <t>[I_D.draft-hoffmann-gendispatch-policy-stakeholders]
    "Policy experts are IETF stakeholders", Work in Progress, Internet-Draft,
    draft-hoffmann-gendispatch-policy-stakeholders-03, 10 January 2024,
    <eref target="https://datatracker.ietf.org/doc/html/draft-hoffmann-gendispatch-policy-stakeholders-03">https://datatracker.ietf.org/doc/html/draft-hoffmann-gendispatch-policy-stakeholders-03</eref></t>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
