<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-privacypass-expiration-extension-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="Privacy Pass Token Expiration Extension">Privacy Pass Token Expiration Extension</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-expiration-extension-00"/>
    <author fullname="Scott Hendrickson">
      <organization>Google</organization>
      <address>
        <email>scott@shendrickson.com</email>
      </address>
    </author>
    <author fullname="Christopher A. Wood">
      <organization>Cloudflare, Inc.</organization>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <date year="2026" month="May" day="15"/>
    <area>Security</area>
    <workgroup>Privacy Pass</workgroup>
    <keyword>token</keyword>
    <keyword>extensions</keyword>
    <abstract>
      <?line 42?>

<t>This document describes an extension for Privacy Pass that allows tokens
to encode expiration information.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-privacypass-expiration-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Privacy Pass Working Group mailing list (<eref target="mailto:privacy-pass@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/privacy-pass/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/privacy-pass/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-privacypass/draft-ietf-privacypass-expiration-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Some Privacy Pass token types support binding additional information to
the tokens, often referred to as public metadata. <xref target="AUTH-EXTENSIONS"/> describes
an extension parameter to the basic PrivateToken HTTP authentication scheme <xref target="AUTH-SCHEME"/>
for supplying this metadata alongside a token. <xref target="EXTENDED-ISSUANCE"/> describes
variants of the basic Privacy Pass issuance protocols <xref target="BASIC-ISSUANCE"/> that
support issuing tokens with public metadata.</t>
      <t>This document describes an extension for Privacy Pass that allows tokens
to encode expiration information. The use case and deployment considerations,
especially with respect to the resulting privacy impact, are also discussed.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="expiration-extension">
      <name>Expiration Extension</name>
      <t>The expiration extension is used to convey the expiration for an issued token.
It is useful for Privacy Pass deployments that make use of cached tokens, i.e.,
those that are not bound to a specific TokenChallenge redemption context, when
they want to limit token lifetime without having to frequently rotate issuing
key pairs.</t>
      <t>For example, consider a Privacy Pass deployment wherein Clients use cached tokens that
are valid for one hour. Clients could pre-fetch these tokens each hour and the Issuer
and Origin could rotate the verification key every hour to force expiration. Alternatively,
Clients could pre-fetch tokens for the entire day all at once, including an expiration
timestamp in each token to indicate the time window for which the token is valid.</t>
      <t>The ExtensionType (defined in <xref target="AUTH-SCHEME"/>) of this extension is <tt>0x01</tt>. The
value of this extension is an ExpirationTimestamp, defined as follows.</t>
      <artwork><![CDATA[
struct {
   uint64 timestamp_precision;
   uint64 timestamp;
} ExpirationTimestamp;
]]></artwork>
      <t>The ExpirationTimestamp fields are defined as follows:</t>
      <ul spacing="normal">
        <li>
          <t>"timestamp_precision" is an 8-octet integer, in network byte order, representing the granularity of the timestamp,
i.e., the target to which the timestamp is rounded for loss of precision.</t>
        </li>
        <li>
          <t>"timestamp" is an 8-octet integer, in network byte order, representing the expiration timestamp. The
expiration timestamp is the UNIX time in seconds at which a token expires, expressed in the UTC/GMT timezone (<xref section="4.1" sectionFormat="comma" target="RFC3339"/>).</t>
        </li>
      </ul>
      <t>As an example, an ExpirationTimestamp structure with the following value would be interpreted as an
expiration timestamp of 1688583600, i.e., July 05, 2023 at 19:00:00 GMT+0000, which is the timestamp
rounded to the nearest hour (timestamp_precision = 3600).</t>
      <artwork><![CDATA[
struct {
   uint64 timestamp_precision = 3600;
   uint64 timestamp = 1688583600;
} ExpirationTimestamp;
]]></artwork>
    </section>
    <section anchor="privacy">
      <name>Privacy Considerations</name>
      <t>This extension intentionally adds more information to a token that might not otherwise be
visibile to Attester, Issuer, or Origin. As such, how this information is chosen can have
an impact on Origin-Client, Issuer-Client, Attester-Origin, or redemption context unlinkability
as defined in <xref section="3.2" sectionFormat="of" target="ARCHITECTURE"/>. Mitigating risk of privacy violation requires
that the extension be constructed in a way that does not induce anonymity set partitioning,
as described in <xref section="6.1" sectionFormat="of" target="ARCHITECTURE"/>.</t>
      <t>The best way to achieve this in practice is for Clients to use the same limited sets of information
in the extension. Consistency can be achieved in a variety of ways. For example,
Client implementations might insist that all Clients use the same deterministic function for
computing the expiration timestamp, e.g., some function F(current time). This
function would round the current timestamp, resulting in a loss of precision but overall
less unique value. One way to implement this function would by rounding the timestamp
to the nearest hour, day, or week. Of course, this does not account for clock skew,
which occurs with some non-negligible probability in practice <xref target="CLOCK-SKEW"/>.</t>
      <t>An alternative implementation strategy for consistency is to run some sort of consistency
check to ensure that the Client uses a value that is consistent with other Clients. Several
consistency mechanisms exist; see <xref target="CONSISTENCY"/> for more information. Such an explicit
consistency check would depend less upon the Client's current clock and thus be more robust
at the cost of additional work.</t>
      <t>Orthogonal to the mechanism used to ensure consistency, it is also important that Clients
choose expiration timestamps that are shared by other Clients. Consider, for example, a
scenario where two Clients consistently choose expiration timestamps per the recommendation
above, but only one Client ever requests a token within a given expiration window. Despite
the consistency check in place, the actual value of the timestamp is still unique to one of
the Clients.</t>
      <t>The means by which implementations ensure that some minimum number of Clients share the same
expiration timestamp is a deployment-specific challenge. For example, in the Split Origin,
Attester, and Issuer deployments as described in <xref section="4.4" sectionFormat="of" target="ARCHITECTURE"/>, the Attester
is positioned to ensure that Clients do not choose consistent yet unique values. General purpose
approaches to ensure that some minimum number of Clients share the same expiration timestamp
are outside the scope of this document; indeed, this problem is not unique to Privacy Pass and
is common to other privacy-related protocols such as Oblivious HTTP <xref target="OHTTP"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Use of the expiration extension risks revealing additional information to parties that see the
extension, including the Attester, Issuer, and Origin. <xref target="privacy"/> discusses specific privacy
implications for use of this extension that aim to mitigate exposure of information that can
unintentionally partition the Client anonymity set and lead to Origin-Client, Issuer-Client,
Attester-Origin, or redemption context unlinkability as defined in <xref section="3.2" sectionFormat="of" target="ARCHITECTURE"/>.
General information regarding the use of extensions and their possible impact on Client privacy
can be found in <xref section="3.4.3" sectionFormat="of" target="ARCHITECTURE"/> and <xref section="6.1" sectionFormat="of" target="ARCHITECTURE"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document registers the following entry into the "Privacy Pass PrivateToken Extensions" registry.</t>
      <ul spacing="normal">
        <li>
          <t>Expiration extension
          </t>
          <ul spacing="normal">
            <li>
              <t>Type: 0x0001</t>
            </li>
            <li>
              <t>Name: Expiration</t>
            </li>
            <li>
              <t>Value: ExpirationTimestamp value as defined in <xref target="expiration-extension"/></t>
            </li>
            <li>
              <t>Reference: This document</t>
            </li>
            <li>
              <t>Notes: None</t>
            </li>
          </ul>
        </li>
      </ul>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="AUTH-EXTENSIONS">
          <front>
            <title>The PrivateToken HTTP Authentication Scheme Extensions Parameter</title>
            <author fullname="Scott Hendrickson" initials="S." surname="Hendrickson">
              <organization>Google</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         </author>
            <date day="13" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies new parameters for the "PrivateToken" HTTP
   authentication scheme, called extensions.  The purpose of these
   extensions is to negotiate and carry public metadata for Privacy Pass
   protocols.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-auth-scheme-extensions-03"/>
        </reference>
        <reference anchor="AUTH-SCHEME">
          <front>
            <title>The Privacy Pass HTTP Authentication Scheme</title>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="23" month="October" year="2023"/>
            <abstract>
              <t>   This document defines an HTTP authentication scheme for Privacy Pass,
   a privacy-preserving authentication mechanism used for authorization.
   The authentication scheme in this document can be used by clients to
   redeem Privacy Pass tokens with an origin.  It can also be used by
   origins to challenge clients to present Privacy Pass tokens.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-auth-scheme-15"/>
        </reference>
        <reference anchor="EXTENDED-ISSUANCE">
          <front>
            <title>Privacy Pass Issuance Protocols with Public Metadata</title>
            <author fullname="Scott Hendrickson" initials="S." surname="Hendrickson">
              <organization>Google</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
         </author>
            <date day="13" month="May" year="2026"/>
            <abstract>
              <t>   This document specifies Privacy Pass issuance protocols that encode
   public information visible to the Client, Attester, Issuer, and
   Origin into each token.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-public-metadata-issuance-03"/>
        </reference>
        <reference anchor="BASIC-ISSUANCE">
          <front>
            <title>Privacy Pass Issuance Protocol</title>
            <author fullname="Sofia Celi" initials="S." surname="Celi">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="3" month="October" year="2023"/>
            <abstract>
              <t>   This document specifies two variants of the two-message issuance
   protocol for Privacy Pass tokens: one that produces tokens that are
   privately verifiable using the issuance private key, and another that
   produces tokens that are publicly verifiable using the issuance
   public key.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-protocol-16"/>
        </reference>
        <reference anchor="ARCHITECTURE">
          <front>
            <title>The Privacy Pass Architecture</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>LIP</organization>
            </author>
            <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
              <organization>Fastly</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="September" year="2023"/>
            <abstract>
              <t>   This document specifies the Privacy Pass architecture and
   requirements for its constituent protocols used for authorization
   based on privacy-preserving authentication mechanisms.  It describes
   the conceptual model of Privacy Pass and its protocols, its security
   and privacy goals, practical deployment models, and recommendations
   for each deployment model that helps ensure the desired security and
   privacy goals are fulfilled.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-architecture-16"/>
        </reference>
        <reference anchor="CONSISTENCY">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="10" month="July" year="2023"/>
            <abstract>
              <t>   This document describes the consistency requirements of protocols
   such as Privacy Pass, Oblivious DoH, and Oblivious HTTP for user
   privacy.  It presents definitions for consistency and then surveys
   mechanisms for providing consistency in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-key-consistency-01"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC3339">
          <front>
            <title>Date and Time on the Internet: Timestamps</title>
            <author fullname="G. Klyne" initials="G." surname="Klyne"/>
            <author fullname="C. Newman" initials="C." surname="Newman"/>
            <date month="July" year="2002"/>
            <abstract>
              <t>This document defines a date and time format for use in Internet protocols that is a profile of the ISO 8601 standard for representation of dates and times using the Gregorian calendar.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3339"/>
          <seriesInfo name="DOI" value="10.17487/RFC3339"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="CLOCK-SKEW">
          <front>
            <title>Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors</title>
            <author fullname="Mustafa Emre Acer" initials="M." surname="Acer">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Emily Stark" initials="E." surname="Stark">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Adrienne Porter Felt" initials="A." surname="Felt">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Sascha Fahl" initials="S." surname="Fahl">
              <organization>Leibniz University Hannover, Hannover, Germany</organization>
            </author>
            <author fullname="Radhika Bhargava" initials="R." surname="Bhargava">
              <organization>Purdue University, West Lafayette, IN, USA</organization>
            </author>
            <author fullname="Bhanu Dev" initials="B." surname="Dev">
              <organization>International Institute of Information Technology, Hyderabad, Hyderabad, India</organization>
            </author>
            <author fullname="Matt Braithwaite" initials="M." surname="Braithwaite">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Ryan Sleevi" initials="R." surname="Sleevi">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <author fullname="Parisa Tabriz" initials="P." surname="Tabriz">
              <organization>Google Inc., Mountain View, CA, USA</organization>
            </author>
            <date month="October" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security" value="pp. 1407-1420"/>
          <seriesInfo name="DOI" value="10.1145/3133956.3134007"/>
          <refcontent>ACM</refcontent>
        </reference>
        <reference anchor="OHTTP">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
      </references>
    </references>
    <?line 187?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document received input and feedback from Jim Laskey.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
