TLS Working Group                                            P. Urien 
  Internet Draft                                          Telecom Paris 
  Intended status: Experimental                              Ethertrust 
                                                                        
                                                          16 March 2025 
  Expires: September 2025 
 
                      TLS For Secure Element Rendez Vous 
                         draft-urien-tls-se-rdv-00.txt 
    
    
Abstract 
    
   TLS for Secure Element (TLS-SE) is a TLS 1.3 profile for secure 
   element. The pre-shared-key (psk) mode requires two security 
   attributes, psk-identity and psk value, somewhat similar to login 
   and password parameters used for classical users accounts. A rendez 
   vous mechanism works with two accounts with different privileges. A 
   root account generates contents and creates guest account with 
   dedicated access rights for these contents. It is a kind of trusted 
   publish-subscribe mechanism based on a TLS1.3 server running in a 
   secure element. 
    
Requirements Language 
    
   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and 
   "OPTIONAL" in this document are to be interpreted as described in 
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all 
   capitals, as shown here. 
    
Status of this Memo 
    
   This Internet-Draft is submitted in full conformance with the 
   provisions of BCP 78 and BCP 79. 
    
   Internet-Drafts are working documents of the Internet Engineering 
   Task Force (IETF).  Note that other groups may also distribute 
   working documents as Internet-Drafts. The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/. 
    
   Internet-Drafts are draft documents valid for a maximum of six 
   months and may be updated, replaced, or obsoleted by other documents 
   at any time. It is inappropriate to use Internet-Drafts as reference 
   material or to cite them other than as "work in progress." 
    
   This Internet-Draft will expire on September 2025. 
    
   . 




   Urien                     Expires September 2025        [Page 1] 


Copyright Notice 
    
   Copyright (c) 2025 IETF Trust and the persons identified as the 
   document authors.  All rights reserved. 
    
   This document is subject to BCP 78 and the IETF Trust's Legal 
   Provisions Relating to IETF Documents 
   (https://trustee.ietf.org/license-info) in effect on the date of 
   publication of this document. 
   Please review these documents carefully, as they describe your 
   rights and restrictions with respect to this document. Code 
   Components extracted from this document must include Revised BSD 
   License text as described in Section 4.e of the Trust Legal 
   Provisions and are provided without warranty as described in the 
   Revised BSD License. 
    
    
Table of Contents 
   Abstract........................................................... 1 
   Requirements Language.............................................. 1 
   Status of this Memo................................................ 1 
   Copyright Notice................................................... 2 
   1 Overview......................................................... 3 
   2 Uniform Resources Identifier for TLS-SE resources................ 3 
   2 User accounts in secure element.................................. 4 
      2.1 Root account................................................ 4 
      2.2 Guest account............................................... 4 
   3 Rendez-Vous...................................................... 4 
   4 Example.......................................................... 4 
      4.1 Writing operation with root account......................... 4 
      4.2 Reading operation with guest account........................ 6 
   5 IANA Considerations.............................................. 8 
   6 Security Considerations.......................................... 8 
   7 References....................................................... 9 
      7.1 Normative References........................................ 9 
      7.2 Informative References...................................... 9 
   8 Authors' Addresses............................................... 9 
 















   Urien                   Expires September 2025           [page 2] 
 
                 TLS For Secure Element Rendez-Vous        March 2025 
 
1 Overview 
    
   TLS for Secure Element (TLS-SE) [TLS-SE] is an ISO7816 [ISO7816] 
   interface for a TLS 1.3 [RFC8446] server running in a secure 
   element. This server is identified by a TLS server name (SN), and is 
   connected to an electronic board providing internet connectivity. 
   When TLS pre-shared-key (PSK) is used, a couple of attributes (PSK-
   Identity, PSK) is associated to a user account. Each account, 
   accesses to secure element resources according to a specific 
   security policy. A root account manages all embedded resources, 
   while other accounts have limited rights fixed by root user. Thanks 
   to these mechanisms TLS-SE devices can be used to securely shared 
   information over internet in a way similar to publish-subscribe 
   architecture. 
    
2 Uniform Resources Identifier for TLS-SE resources 
    
    
              +---------------+               +------------------+ 
              |               |               |     Resources    | 
              |               |               |   User Account   | 
              |    TCP/IP     +===============+        psk       | 
              |     Node      | Communication |   psk-identity   | 
              |               |   Interface   |   Server Name    | 
              |               |               |  TLS-SE  Server  | 
              +---------------+               +------------------+ 
             TLS1.3 Front Server            TLS1.3 TLS-SE End Server 
    
   One or several TLS-SE [TLS-SE] secure elements are connected to a 
   TCP/IP node thanks to a communication interface, such as ISO7816, 
   I2C, or SPI [GP-SPI-I2C]. The TCP/IP node is a front TLS1.3 server. 
   A TLS-SE device is a TLS end server identified by the Server-Name 
   (SN) attribute. 
    
   A resource is identified by the following Uniform Resource 
   Identifier (URI) 
    
   schemeS://SEN:PSK(ID)@IP:PORT/?query 
    
   where 
   - scheme is the syntax used over TLS 
   - S means secured by TLS 
   - SEN is the TLS Server-Name used by the TLS-SE application 
   - PSK is the pre-shared-key 
   - ID is the psk-identity 
   - IP is the front TLS server IP address 
   - PORT is the front TLS server port 
   - query is a request encoded according to the scheme syntax 
    
    


   Urien                 Expires September 2025             [Page 3] 
 
                 TLS For Secure Element Rendez-Vous        March 2025 
 
2 User accounts in secure element 
    
2.1 Root account 
    
   A TLS-SE device MUST comprise at least a couple of attributes (psk-
   identity, psk) which identifies a root account. The root account 
   manages all secure element resources such as secure storage or 
   cryptographic procedures. It MAY also create or delete other 
   accounts, referred as guest, associated with different (psk-
   identity, psk) tuples, and define a specific access policy for each 
   of them. 
    
2.2 Guest account 
    
   Guest accounts are created and deleted by root. They access to 
   embedded resources according to specific access policies. 
    
3 Rendez-Vous 
    
   The "Rendez-Vous" mechanism is managed by the root account. A 
   resource is created, and is made available for a guest, according to 
   a specific access policy. 
    
   For example the root creates a data record, and gives a read right 
   for a particular guest. Out of band mechanisms are used to notify 
   the associated URI. 
    
   In a similar way the root creates a cryptographic key, and gives an 
   encrypt/decrypt right for a particular guess. Out of band mechanisms 
   are used to notify the associated URI. 
    
     root-psk              +---------------+                guest-psk 
     psk-identity= root    |               |      psk-identity= guest 
     Create resource ----->| TLS-SE Server |<----- Access to resource 
     Create guest account  |               | 
                           +---------------+ 
    
4 Example 
    
4.1 Writing operation with root account 
    
   psk-identity is root 
    
   Server Name is key1.com 
    
   RxNET 
   16030300F8010000F403035BD19B1B1C65E63B0AF76336564D8E126FDD38FCDC 
   31CC6CC0D57BE9BEED595B0000021304010000C9002D0003020001002B000302 
   0304000D001E001C06030503040302030806080B0805080A0804080906010501 
   040102010033004700450017004104E744613691E94E64959DB785E2EF8589DE 
   0FE843B94E04B62E75D78C7B6C34644C3D2031D31745DB2A5F71CFA943542257 

   Urien                 Expires September 2025             [Page 4] 
 
                 TLS For Secure Element Rendez-Vous        March 2025 
 
   9ADF9ADA8BCE5DBB01632A40F5052A000A00060004001800170000000D000B00 
   0008 6B6579312E636F6D 0029002F000A0004 726F6F74 000000000021202E 
   8241F586AD78A9D767CA761624517935BCD99D1C3265E386FBAD67225498E8 
    
   Tx: 00D80001F016030300F8010000F40303 
       5BD19B1B1C65E63B0AF76336564D8E12 
       6FDD38FCDC31CC6CC0D57BE9BEED595B 
       0000021304010000C9002D0003020001 
       002B0003020304000D001E001C060305 
       03040302030806080B0805080A080408 
       09060105010401020100330047004500 
       17004104E744613691E94E64959DB785 
       E2EF8589DE0FE843B94E04B62E75D78C 
       7B6C34644C3D2031D31745DB2A5F71CF 
       A9435422579ADF9ADA8BCE5DBB01632A 
       40F5052A000A00060004001800170000 
       000D000B0000086B6579312E636F6D00 
       29002F000A0004726F6F740000000000 
       21202E8241F586AD78A9D767CA761624 
       517935BCD9 
   Rx[101ms]: 
   9000 
   Tx: 00D800020D9D1C3265E386FBAD672254 
       98E8 
   Rx[396ms]: 
       16030300810200007D03038968138C01 
       02FEE1A71A65BD7C1FF12B1A6C7D1ADF 
       4EABFEF4CA1F2CE89498590013040000 
       55002900020000003300450017004104 
       54AE904C21CBF67106A551B2191EF3C3 
       260817A2B81DC7DFF5C4246CE729D617 
       66F29B6B34EFD1E8805565ED8636701E 
       2C745075774E8C998661B8780D20638A 
       002B00020304 
       9F1C 
   Tx: 00C000001C 
   Rx[40ms]: 
       170303001750FC6821BA8D491FD75F10 
       CF193E16C3701FEBBC1283B8 
       9F3A 
   Tx: 00C000003A 
   Rx[101ms]: 
       1703030035ED588DC0A217F525449ADF 
       88C31C2E75C8B83557DFA0D0AC27331F 
       542818CECC3CDFE57A879A9D96F6369F 
       4B0A697E022E05D86379 
       9000 
   TxNET 
   16030300810200007D03038968138C0102FEE1A71A65BD7C1FF12B1A6C7D1ADF 
   4EABFEF4CA1F2CE8949859001304000055002900020000003300450017004104 
   54AE904C21CBF67106A551B2191EF3C3260817A2B81DC7DFF5C4246CE729D617 

   Urien                 Expires September 2025             [Page 5] 
 
                 TLS For Secure Element Rendez-Vous        March 2025 
 
   66F29B6B34EFD1E8805565ED8636701E2C745075774E8C998661B8780D20638A 
   002B00020304170303001750FC6821BA8D491FD75F10CF193E16C3701FEBBC12 
   83B81703030035ED588DC0A217F525449ADF88C31C2E75C8B83557DFA0D0AC27 
   331F542818CECC3CDFE57A879A9D96F6369F4B0A697E022E05D86379 
    
   RxNET 
   1703030035675062F7FB7D6C1D4D61A753755A273F3582D691AF9A47AB725B66 
   4750ACE4B84E001F30F89D98A138C0145F7E71A5B3F23E416BCB 
   Tx: 00D800033A1703030035675062F7FB7D 
       6C1D4D61A753755A273F3582D691AF9A 
       47AB725B664750ACE4B84E001F30F89D 
       98A138C0145F7E71A5B3F23E416BCB 
   Rx[218ms]: 
   9001 
    
   TLS-PSK OPEN 
    
   Writing 32 bytes at record 00, encoded in hexadecimal 
   Z001234567890ABCDEF1234567890ABCDEF1234567890ABCDEF1234567890ABCDEF 
   Return: OK 
    
   RxNET 
   170303005680A9EFBA1AAD90DBB8B454C60B02FCFD32F8FFBB8B6C356654F482 
   B88C916D4F2F3E23D80E8884A2E2F98C449E61565A0501B416961E90405F4C82 
   12A0EAB8BCB7A91BD6FB2DF86C79C6ECCF58EED1C633057B6461DB 
    
   Tx: 00D800035B170303005680A9EFBA1AAD 
       90DBB8B454C60B02FCFD32F8FFBB8B6C 
       356654F482B88C916D4F2F3E23D80E88 
       84A2E2F98C449E61565A0501B416961E 
       90405F4C8212A0EAB8BCB7A91BD6FB2D 
       F86C79C6ECCF58EED1C633057B6461DB 
   Rx[126ms]: 
       17030300154B56A506A564B0E77B9C37 
       903B66D1A3EBF75C6D49 
       9000 
    
   TxNET 
   17030300154B56A506A564B0E77B9C37903B66D1A3EBF75C6D49 
    
4.2 Reading operation with guest account 
    
   psk-identity is guest 
    
   Server Name is key1.com 
    
   RxNET 
   16030300F9010000F5030344E287926C1581927C0D6AB7FAECD454D85BE7CE88 
   ADAA91FD4F0AD1F93819FC0000021304010000CA002D0003020001002B000302 
   0304000D001E001C06030503040302030806080B0805080A0804080906010501 
   04010201003300470045001700410431A71EFFF0B95E9FF0CEADF9708EA0D71B 

   Urien                 Expires September 2025             [Page 6] 
 
                 TLS For Secure Element Rendez-Vous        March 2025 
 
   E70465820324B755EE8627549BDE463DE646F88654D629653E9425BDFED09EDB 
   FBABA235CC493303EB577C695AC1F7000A00060004001800170000000D000B00 
   0008 6B6579312E636F6D 00290030000B0005 6775657374 00000000002120 
   FAF96847AB730FAE992C475E18F9212384DD7EC66DF08CEC62564CC60D3C87DF 
    
   Tx: 00D80001F016030300F9010000F50303 
       44E287926C1581927C0D6AB7FAECD454 
       D85BE7CE88ADAA91FD4F0AD1F93819FC 
       0000021304010000CA002D0003020001 
       002B0003020304000D001E001C060305 
       03040302030806080B0805080A080408 
       09060105010401020100330047004500 
       1700410431A71EFFF0B95E9FF0CEADF9 
       708EA0D71BE70465820324B755EE8627 
       549BDE463DE646F88654D629653E9425 
       BDFED09EDBFBABA235CC493303EB577C 
       695AC1F7000A00060004001800170000 
       000D000B0000086B6579312E636F6D00 
       290030000B0005677565737400000000 
       002120FAF96847AB730FAE992C475E18 
       F9212384DD 
   Rx[101ms]: 
   9000 
   Tx: 00D800020E7EC66DF08CEC62564CC60D 
       3C87DF 
   Rx[397ms]: 
       16030300810200007D03031ABA22C6DC 
       69DF27170FFC086E7B3CD6A2120656C0 
       E57868E70043DCC9D519430013040000 
       55002900020000003300450017004104 
       194A75BF7C9CB96E09CFEB75CE2D4B09 
       FA4EAEFFFCB8EBEA8115D637FB77D441 
       F292ABBEC8833C5B452E08D2E35C3410 
       9A6F8AD223E99F8EE984CEC767A98237 
       002B00020304 
       9F1C 
   Tx: 00C000001C 
   Rx[42ms]: 
       1703030017D82DE3B01BD709F1E325E8 
       671C95AA15E1286C65245AA0 
       9F3A 
   Tx: 00C000003A 
   Rx[98ms]: 
       17030300350DFEEC2D27131499695A19 
       BD743D32D6C70382772AC7549F77CCED 
       024940409070A6231CF6C4611330AC0B 
       CF4B217B841AC32F4682 
       9000 
    
   TxNET 
   16030300810200007D03031ABA22C6DC69DF27170FFC086E7B3CD6A2120656C0 

   Urien                 Expires September 2025             [Page 7] 
 
                 TLS For Secure Element Rendez-Vous        March 2025 
 
   E57868E70043DCC9D51943001304000055002900020000003300450017004104 
   194A75BF7C9CB96E09CFEB75CE2D4B09FA4EAEFFFCB8EBEA8115D637FB77D441 
   F292ABBEC8833C5B452E08D2E35C34109A6F8AD223E99F8EE984CEC767A98237 
   002B000203041703030017D82DE3B01BD709F1E325E8671C95AA15E1286C6524 
   5AA017030300350DFEEC2D27131499695A19BD743D32D6C70382772AC7549F77 
   CCED024940409070A6231CF6C4611330AC0BCF4B217B841AC32F4682 
    
   RxNET 
   17030300356935F41A5C9C3EE7CCE3543957912880B4CE3395E14509A718CE89 
   D1C731B3AAB47B78E2BE8E87379358478A041A6DDDABD93A34B3 
    
   Tx: 00D800033A17030300356935F41A5C9C 
       3EE7CCE3543957912880B4CE3395E145 
       09A718CE89D1C731B3AAB47B78E2BE8E 
       87379358478A041A6DDDABD93A34B3 
   Rx[218ms]: 
   9001 
    
   TLS-PSK OPEN 
    
   Reading 32 bytes at record 00: I00 
    
   RxNET 
   1703030016CAC2F4BBF97ABCB82F628E8674C19EBB73CE03F90AD4 
    
   Tx: 00D800031B1703030016CAC2F4BBF97A 
       BCB82F628E8674C19EBB73CE03F90AD4 
   Rx[117ms]: 
       1703030053E72D6092F22C59106D033B 
       7DA402C18ED7BBB107D0C0C52B769019 
       1CD5F8D99698F111B86856EC984CDA58 
       5652C176C78456E41CEF089B74A4CE67 
       44BCBCEB695298ED8DECF765D2FF29AA 
       D7D2B75CC9E67EE7 
       9000 
    
   TxNET 
   1703030053E72D6092F22C59106D033B7DA402C18ED7BBB107D0C0C52B769019 
   1CD5F8D99698F111B86856EC984CDA585652C176C78456E41CEF089B74A4CE67 
   44BCBCEB695298ED8DECF765D2FF29AAD7D2B75CC9E67EE7 
    
5 IANA Considerations 
    
   This draft does not require any action from IANA. 
    
6 Security Considerations 
    
   This entire document is about security. 
    
    
    

   Urien                 Expires September 2025             [Page 8] 
 
                 TLS For Secure Element Rendez-Vous        March 2025 
 
    
7 References 
    
7.1 Normative References 
    
   [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 
   Requirement Levels", BCP 14, RFC 2119,DOI 10.17487/RFC2119, March 
   1997, <https://www.rfc-editor.org/info/rfc2119> 
    
   [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 
   2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, May 2017, 
   <https://www.rfc-editor.org/info/rfc8174>. 
    
   [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol 
   Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, 
   https://www.rfc-editor.org/info/rfc8446. 
    
    
   [ISO7816] ISO 7816, "Cards Identification - Integrated Circuit Cards 
   with Contacts", The International Organization for Standardization 
   (ISO). 
    
   [GP-SPI-I2C] GlobalPlatform Technology, APDU Transport over SPI/I2C 
   Version 0.0.0.39, July 2019 
    
7.2 Informative References 
    
   [TLS-SE] Secure Element for TLS Version 1.3, draft-urien-tls-se-08, 
   December 2024 
    
8 Authors' Addresses 
    
   Pascal Urien 
   Telecom Paris 
   19 place Marguerite Perey 
   91120 Palaiseau 
   France 
   Email: Pascal.Urien@telecom-paris.fr 














   Urien                 Expires September 2025             [Page 9]