<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-keytrans-architecture-06" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Key Transparency Architecture</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-keytrans-architecture-06"/>
    <author fullname="Brendan McMillion">
      <organization/>
      <address>
        <email>brendanmcmillion@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="21"/>
    <area>Security</area>
    <workgroup>Key Transparency</workgroup>
    <keyword>key transparency</keyword>
    <abstract>
      <?line 37?>

<t>This document defines the terminology and interaction patterns involved in the
deployment of Key Transparency in a general secure group messaging
infrastructure, and specifies the security properties that the protocol
provides. It also gives more general, non-prescriptive guidance on how to
securely apply Key Transparency to a number of common applications.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-keytrans.github.io/draft-arch/draft-ietf-keytrans-architecture.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-keytrans-architecture/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Key Transparency Working Group mailing list (<eref target="mailto:keytrans@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/keytrans/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/keytrans/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-keytrans/draft-arch"/>.</t>
    </note>
  </front>
  <middle>
    <?line 45?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Before any information can be exchanged in an end-to-end encrypted system, two
things must happen: First, participants in the system must provide the service
operator with any public keys they wish to use to receive messages. Second, the
service operator must somehow distribute these public keys amongst the
participants that wish to communicate with each other.</t>
      <t>Typically this is done by having users upload their public keys to a simple
directory where other users can download them as necessary, or by providing
public keys in-band with the communication being secured. If the service
operator is simply trusted to correctly forward public keys between users, this
means that the underlying encryption protocol can only protect users against
passive eavesdropping on their messages.</t>
      <t>However, most messaging systems are designed such that all messages are
exchanged through the service operator's servers, which makes it extremely easy
for an operator to launch an active attack. That is, the service operator can
take public keys for which it knows the corresponding private keys, and
associate those public keys with a user's account without the user's knowledge
to impersonate or eavesdrop on conversations with that user.</t>
      <t>Key Transparency (KT) solves this problem by requiring the service operator to
store user public keys in a cryptographically protected append-only log. Any
malicious entries added to such a log will generally be equally visible to both
the affected user and the user's contacts. This allows users to detect whether
they are being impersonated by viewing the public keys attached to their
account. If the service operator attempts to conceal some entries of the log
from some users but not others, this creates a "forked view" which is permanent
and easily detectable.</t>
      <t>The critical improvement of KT over related protocols like Certificate
Transparency <xref target="RFC6962"/> is that KT includes an efficient
protocol to search the log for entries related to a specific participant. This
means users don't need to download the entire log, which may be substantial, to
find all entries that are relevant to them. It also means that KT can better
preserve user privacy by only showing entries of the log to participants that
genuinely need to see them.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<dl>
        <dt><strong>End-to-End Encrypted Communication Service:</strong></dt>
        <dd>
          <t>A communication service that allows end-users to engage in text, voice,
video, or other forms of communication over the internet, and uses public key
cryptography to ensure that communications are only accessible to their
intended recipients.</t>
        </dd>
        <dt><strong>End-User Device:</strong></dt>
        <dd>
          <t>The device at the final point in a digital communication, which may either
send or receive encrypted data in an end-to-end encrypted communication
service.</t>
        </dd>
        <dt><strong>End-User Identity:</strong></dt>
        <dd>
          <t>A unique and user-visible identity associated with an account (and therefore
one or more end-user devices) in an end-to-end encrypted communication
service. In the case where an end-user explicitly requests to communicate with
(or is informed they are communicating with) an end-user uniquely identified
by the name "Alice", the end-user identity is the string "Alice".</t>
        </dd>
        <dt><strong>User / Account:</strong></dt>
        <dd>
          <t>A single end-user of an end-to-end encrypted communication service, which may
be represented by several end-user identities and end-user devices. For
example, a user may be represented simultaneously by multiple identities
(email, phone number, username) and interact with the service on multiple
devices (phone, laptop).</t>
        </dd>
        <dt><strong>Service Operator:</strong></dt>
        <dd>
          <t>The primary organization that provides the infrastructure for an end-to-end
encrypted communication service and the software to participate in it.</t>
        </dd>
        <dt><strong>Transparency Log:</strong></dt>
        <dd>
          <t>A specialized service capable of securely attesting to the information (such
as public keys) associated with a given end-user identity. A transparency
log is usually run either entirely or partially by the service operator, but
could also be operated externally.</t>
        </dd>
      </dl>
    </section>
    <section anchor="protocol-overview">
      <name>Protocol Overview</name>
      <t>From a networking perspective, KT follows a client-server architecture with a
central <em>transparency log</em>, acting as a server, which holds the authoritative
copy of all information and exposes endpoints that allow users to query or
modify stored data. Users coordinate with each other through the server by
uploading their own public keys and downloading the public keys of other
users. Users are expected to maintain relatively little state, limited only
to what is required to interact with the log and ensure that it is behaving
honestly.</t>
      <t>From an application perspective, KT can be thought of as a versioned key-value
database. Users insert key-value pairs into the database where, for example, the
key is their username and the value is their public key. Users can update a key
by inserting a new version with new data. They can also look up the most recent
version of a key or any previous version. From this point forward, the term
<strong>label</strong> will be used to refer to lookup keys in the key-value database that a
transparency log represents to avoid confusion with cryptographic public or
private keys.</t>
      <t>Users are considered to <strong>own</strong> a label if they are understood to either
initiate all changes to the label's value, or if they must be informed of all
changes to the label's value. The latter situation may occur if, for example, KT
is deployed in a way where the service operator makes automated modifications to
stored data. The owning user would then be informed, after the fact, of
modifications to verify that they were legal.</t>
      <t>KT does not require the use of a specific transport protocol. This is intended
to allow applications to layer KT on top of whatever transport protocol their
application already uses. In particular, this allows applications to continue
relying on their existing access control system.</t>
      <t>With some small exceptions, applications may enforce arbitrary access control
rules on top of KT. This may include requiring a user to be logged in to make KT
requests, only allowing a user to lookup the labels of another user if they're
"friends", or applying a rate limit. Applications <bcp14>SHOULD</bcp14> prevent users from
modifying labels they do not own. The exact mechanism for rejecting requests,
and possibly explaining the reason for rejection, is left to the application.</t>
      <section anchor="user-operations">
        <name>User Operations</name>
        <t>The operations that can be executed by a user are as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t><strong>Search:</strong> Looks up the value of a specific label in the most recent version
of the log. Users may request either a specific version of the label or the
most recent version available. If the label-version pair exists, the server
returns the corresponding value and an inclusion proof.</t>
          </li>
          <li>
            <t><strong>Update:</strong> Adds a new label-value pair to the log, for which the server
returns an inclusion proof. Note that this means that new values are added to
the log immediately and no provisional inclusion proof, such as an SCT as
defined in <xref section="3" sectionFormat="of" target="RFC6962"/>, is provided.</t>
          </li>
          <li>
            <t><strong>Monitor:</strong> While Search and Update are run by the user as necessary,
monitoring is done in the background on a recurring basis. It can both check
that the log is continuing to behave honestly (all previously returned labels
remain in the tree) and that no changes have been made to labels owned by the
user without the user's knowledge.</t>
          </li>
        </ol>
        <t>These operations are executed over an application-provided transport layer.
The transport layer enforces access control by blocking queries which are
not allowed:</t>
        <figure anchor="request-response">
          <name>Example request and response flow. Valid requests receive a response while invalid requests are blocked by the transport layer.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="336" width="456" viewBox="0 0 456 336" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 24,48 L 24,320" fill="none" stroke="black"/>
                <path d="M 384,48 L 384,320" fill="none" stroke="black"/>
                <path d="M 152,96 L 376,96" fill="none" stroke="black"/>
                <path d="M 32,112 L 208,112" fill="none" stroke="black"/>
                <path d="M 136,144 L 376,144" fill="none" stroke="black"/>
                <path d="M 32,160 L 208,160" fill="none" stroke="black"/>
                <path d="M 192,192 L 376,192" fill="none" stroke="black"/>
                <path d="M 32,208 L 208,208" fill="none" stroke="black"/>
                <path d="M 144,288 L 320,288" fill="none" stroke="black"/>
                <path d="M 176,304 L 320,304" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="384,192 372,186.4 372,197.6" fill="black" transform="rotate(0,376,192)"/>
                <polygon class="arrowhead" points="384,144 372,138.4 372,149.6" fill="black" transform="rotate(0,376,144)"/>
                <polygon class="arrowhead" points="384,96 372,90.4 372,101.6" fill="black" transform="rotate(0,376,96)"/>
                <polygon class="arrowhead" points="328,304 316,298.4 316,309.6" fill="black" transform="rotate(0,320,304)"/>
                <polygon class="arrowhead" points="328,288 316,282.4 316,293.6" fill="black" transform="rotate(0,320,288)"/>
                <polygon class="arrowhead" points="40,208 28,202.4 28,213.6" fill="black" transform="rotate(180,32,208)"/>
                <polygon class="arrowhead" points="40,160 28,154.4 28,165.6" fill="black" transform="rotate(180,32,160)"/>
                <polygon class="arrowhead" points="40,112 28,106.4 28,117.6" fill="black" transform="rotate(180,32,112)"/>
                <g class="text">
                  <text x="24" y="36">Alice</text>
                  <text x="372" y="36">Transparency</text>
                  <text x="440" y="36">Log</text>
                  <text x="116" y="68">(Valid</text>
                  <text x="152" y="68">/</text>
                  <text x="196" y="68">Accepted</text>
                  <text x="272" y="68">Requests)</text>
                  <text x="88" y="100">Search(Alice)</text>
                  <text x="296" y="116">SearchResponse(...)</text>
                  <text x="80" y="148">Search(Bob)</text>
                  <text x="296" y="164">SearchResponse(...)</text>
                  <text x="88" y="196">Update(Alice,</text>
                  <text x="164" y="196">...)</text>
                  <text x="296" y="212">UpdateResponse(...)</text>
                  <text x="120" y="260">(Rejected</text>
                  <text x="168" y="260">/</text>
                  <text x="208" y="260">Blocked</text>
                  <text x="280" y="260">Requests)</text>
                  <text x="84" y="292">Search(Fred)</text>
                  <text x="336" y="292">X</text>
                  <text x="80" y="308">Update(Bob,</text>
                  <text x="148" y="308">...)</text>
                  <text x="336" y="308">X</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Alice                                   Transparency Log
  |                                            |
  |        (Valid / Accepted Requests)         |
  |                                            |
  | Search(Alice) ---------------------------->|
  |<---------------------- SearchResponse(...) |
  |                                            |
  | Search(Bob) ------------------------------>|
  |<---------------------- SearchResponse(...) |
  |                                            |
  | Update(Alice, ...) ----------------------->|
  |<---------------------- UpdateResponse(...) |
  |                                            |
  |                                            |
  |       (Rejected / Blocked Requests)        |
  |                                            |
  | Search(Fred) ----------------------> X     |
  | Update(Bob, ...) ------------------> X     |
  |                                            |
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="credentials">
        <name>Credentials</name>
        <t>While users are generally understood to interact directly with the transparency
log, many end-to-end encrypted communication services require the ability to
provide <em>credentials</em> to their users. Credentials convey a binding between an
end-user identity and public keys or other information, and can be verified with
minimal network access.</t>
        <t>In particular, credentials that can be verified with minimal network access are
often desired by applications that support anonymous communication. These
applications provide end-to-end encryption with a protocol like the Messaging
Layer Security Protocol <xref target="RFC9420"/> (with the encryption of handshake messages
required) or Sealed Sender <xref target="sealed-sender"/>. When a user sends a message, these
protocols have the sender provide their own credential in an encrypted portion
of the message.</t>
        <t>Encrypting the sender's credential allows the sender to submit messages over an
anonymous channel by specifying only the recipient's identity. The service
operator can deliver the message to the intended recipient, who can decrypt it
and validate the credential inside to be assured of the sender's identity. Note
that the recipient does not need access to an anonymous channel to preserve the
sender's anonymity.</t>
        <t>At a high level, KT credentials are created by serializing one or more Search
request-response pairs. These Search operations correspond to the lookups the
recipient would do to authenticate the relationship between the presented
end-user identity and their public keys. Recipients can verify the
request-response pairs themselves without contacting the transparency log.</t>
        <t>Any future monitoring that may be required <bcp14>SHOULD</bcp14> be provided to recipients
proactively by the sender. However, if this fails, the recipient will need to
perform the monitoring themself over an anonymous channel.</t>
        <figure anchor="anonymous">
          <name>Example message flow in an anonymous deployment. Users request their own label from the transparency log and provide the serialized response, functioning as a credential, in encrypted messages to other users. Required monitoring is provided proactively.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="224" width="504" viewBox="0 0 504 224" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,208" fill="none" stroke="black"/>
                <path d="M 272,48 L 272,208" fill="none" stroke="black"/>
                <path d="M 496,48 L 496,208" fill="none" stroke="black"/>
                <path d="M 16,64 L 144,64" fill="none" stroke="black"/>
                <path d="M 184,80 L 264,80" fill="none" stroke="black"/>
                <path d="M 408,128 L 488,128" fill="none" stroke="black"/>
                <path d="M 16,160 L 136,160" fill="none" stroke="black"/>
                <path d="M 192,176 L 264,176" fill="none" stroke="black"/>
                <path d="M 456,192 L 488,192" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="496,192 484,186.4 484,197.6" fill="black" transform="rotate(0,488,192)"/>
                <polygon class="arrowhead" points="496,128 484,122.4 484,133.6" fill="black" transform="rotate(0,488,128)"/>
                <polygon class="arrowhead" points="272,176 260,170.4 260,181.6" fill="black" transform="rotate(0,264,176)"/>
                <polygon class="arrowhead" points="272,80 260,74.4 260,85.6" fill="black" transform="rotate(0,264,80)"/>
                <polygon class="arrowhead" points="24,160 12,154.4 12,165.6" fill="black" transform="rotate(180,16,160)"/>
                <polygon class="arrowhead" points="24,64 12,58.4 12,69.6" fill="black" transform="rotate(180,16,64)"/>
                <g class="text">
                  <text x="52" y="36">Transparency</text>
                  <text x="120" y="36">Log</text>
                  <text x="272" y="36">Alice</text>
                  <text x="416" y="36">Anonymous</text>
                  <text x="480" y="36">Group</text>
                  <text x="208" y="68">Search(Alice)</text>
                  <text x="96" y="84">SearchResponse(...)</text>
                  <text x="332" y="84">Encrypt(Anon</text>
                  <text x="412" y="84">Group,</text>
                  <text x="372" y="100">SearchResponse</text>
                  <text x="444" y="100">||</text>
                  <text x="344" y="116">Message</text>
                  <text x="404" y="116">||</text>
                  <text x="356" y="132">Signature)</text>
                  <text x="204" y="164">Monitor(Alice)</text>
                  <text x="100" y="180">MonitorResponse(...)</text>
                  <text x="332" y="180">Encrypt(Anon</text>
                  <text x="412" y="180">Group,</text>
                  <text x="380" y="196">MonitorResponse)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Transparency Log               Alice           Anonymous Group
|                                |                           |
|<---------------- Search(Alice) |                           |
| SearchResponse(...) ---------->| Encrypt(Anon Group,       |
|                                |     SearchResponse ||     |
|                                |     Message   ||          |
|                                |     Signature) ---------->|
|                                |                           |
|<--------------- Monitor(Alice) |                           |
| MonitorResponse(...) --------->| Encrypt(Anon Group,       |
|                                |     MonitorResponse) ---->|
|                                |                           |
]]></artwork>
          </artset>
        </figure>
      </section>
      <section anchor="detecting-forks">
        <name>Detecting Forks</name>
        <t>It is sometimes possible for a transparency log to present forked views of data
to different users. This means that, from an individual user's perspective, a
log may appear to be operating correctly in the sense that all of a user's
requests succeed and proofs verify correctly. However, the transparency log has
presented a view to the user that's not globally consistent with what it has
shown other users. As such, the log may be able to change a label's value
without the label's owner becoming aware.</t>
        <t>The protocol is designed such that users always require subsequent queries to
prove consistency with previous queries. As such, users always stay on a
linearizable view of the log. If a user is ever presented with a forked view,
they hold on to this forked view forever and reject the output of any subsequent
queries that are inconsistent with it.</t>
        <t>This provides ample opportunity for users to detect when a fork has been
presented but isn't in itself sufficient for detection. To detect forks, users
require either a <strong>trusted third party</strong>, <strong>anonymous communication</strong> with the
transparency log, or <strong>peer-to-peer communication</strong>.</t>
        <t>With a trusted third party, such as a Third-Party Auditor or Manager as
described in <xref target="third-party-auditing"/> and <xref target="third-party-management"/>, an outside
organization monitors the operation of the transparency log. This third party
verifies, among other things, that the transparency log is growing in an
append-only manner. If verification is successful, the third party produces
a signature on the most recent tree head. The transparency log provides this
signature to users inline with their query responses as proof that they are not
being shown a fork. This approach relies on an assumption that the third party
is trusted not to collude with the transparency log to sign a fork.</t>
        <t>With anonymous communication, a single user accesses the transparency log over
an anonymous channel and checks that the transparency log is presenting the same
tree head over the anonymous channel as it does over an authenticated channel.
The security of this approach relies on the fact that, if the transparency log
doesn't know which user is making the request, it will show the user the wrong
fork with high probability. Repeating this check over time makes it
overwhelmingly likely that any fork presented to any user will be detected.</t>
        <t>With peer-to-peer communication, two users gossip with each other to establish
that they both have the same view of the transparency log. This gossip is able
to happen over any supported out-of-band channel even if it is heavily
bandwidth-constrained, such as scanning a QR code. However, this approach is
only secure if gossip can be implemented such that gossipping users are
reasonably expected to form a connected graph of all users. If not, then the
transparency log can attempt to partition users into subsets that do not gossip
and can present each subset of users with different forks.</t>
        <t>Regardless of approach, in the event that a fork is successfully detected, the
user is able to produce non-repudiable proof of log misbehavior which can be
published.</t>
        <figure anchor="out-of-band-checking">
          <name>Users receive tree heads while making authenticated requests to a transparency log. Users ensure consistency of tree heads by either comparing amongst themselves, or by contacting the transparency log over an anonymous channel. Requests that require authentication do not need to be available over the anonymous channel.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="304" width="584" viewBox="0 0 584 304" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,288" fill="none" stroke="black"/>
                <path d="M 232,48 L 232,288" fill="none" stroke="black"/>
                <path d="M 576,48 L 576,288" fill="none" stroke="black"/>
                <path d="M 344,96 L 568,96" fill="none" stroke="black"/>
                <path d="M 240,112 L 328,112" fill="none" stroke="black"/>
                <path d="M 16,224 L 72,224" fill="none" stroke="black"/>
                <path d="M 392,224 Q 394,220.8 396,224 Q 398,227.2 400,224 Q 402,220.8 404,224 Q 406,227.2 408,224 Q 410,220.8 412,224 Q 414,227.2 416,224 Q 418,220.8 420,224 Q 422,227.2 424,224 Q 426,220.8 428,224 Q 430,227.2 432,224 Q 434,220.8 436,224 Q 438,227.2 440,224 Q 442,220.8 444,224 Q 446,227.2 448,224 Q 450,220.8 452,224 Q 454,227.2 456,224 Q 458,220.8 460,224 Q 462,227.2 464,224 Q 466,220.8 468,224 Q 470,227.2 472,224 Q 474,220.8 476,224 Q 478,227.2 480,224 Q 482,220.8 484,224 Q 486,227.2 488,224 Q 490,220.8 492,224 Q 494,227.2 496,224 Q 498,220.8 500,224 Q 502,227.2 504,224 Q 506,220.8 508,224 Q 510,227.2 512,224 Q 514,220.8 516,224 Q 518,227.2 520,224 Q 522,220.8 524,224 Q 526,227.2 528,224 Q 530,220.8 532,224 Q 534,227.2 536,224 Q 538,220.8 540,224 Q 542,227.2 544,224 Q 546,220.8 548,224 Q 550,227.2 552,224 Q 554,220.8 556,224 Q 558,227.2 560,224 " fill="none" stroke="black"/>
                <path d="M 88,240 L 224,240" fill="none" stroke="black"/>
                <path d="M 248,240 Q 250,236.8 252,240 Q 254,243.2 256,240 Q 258,236.8 260,240 Q 262,243.2 264,240 Q 266,236.8 268,240 Q 270,243.2 272,240 Q 274,236.8 276,240 Q 278,243.2 280,240 Q 282,236.8 284,240 Q 286,243.2 288,240 Q 290,236.8 292,240 Q 294,243.2 296,240 Q 298,236.8 300,240 Q 302,243.2 304,240 Q 306,236.8 308,240 Q 310,243.2 312,240 Q 314,236.8 316,240 Q 318,243.2 320,240 Q 322,236.8 324,240 Q 326,243.2 328,240 Q 330,236.8 332,240 Q 334,243.2 336,240 Q 338,236.8 340,240 Q 342,243.2 344,240 Q 346,236.8 348,240 Q 350,243.2 352,240 Q 354,236.8 356,240 Q 358,243.2 360,240 Q 362,236.8 364,240 Q 366,243.2 368,240 Q 370,236.8 372,240 Q 374,243.2 376,240 Q 378,236.8 380,240 Q 382,243.2 384,240 Q 386,236.8 388,240 Q 390,243.2 392,240 Q 394,236.8 396,240 Q 398,243.2 400,240 Q 402,236.8 404,240 Q 406,243.2 408,240 Q 410,236.8 412,240 Q 414,243.2 416,240 Q 418,236.8 420,240 Q 422,243.2 424,240 Q 426,236.8 428,240 Q 430,243.2 432,240 Q 434,236.8 436,240 Q 438,243.2 440,240 Q 442,236.8 444,240 Q 446,243.2 448,240 Q 450,236.8 452,240 Q 454,243.2 456,240 Q 458,236.8 460,240 Q 462,243.2 464,240 Q 466,236.8 468,240 Q 470,243.2 472,240 Q 474,236.8 476,240 Q 478,243.2 480,240 Q 482,236.8 484,240 Q 486,243.2 488,240 Q 490,236.8 492,240 Q 494,243.2 496,240 " fill="none" stroke="black"/>
                <path d="M 344,272 Q 346,268.8 348,272 Q 350,275.2 352,272 Q 354,268.8 356,272 Q 358,275.2 360,272 Q 362,268.8 364,272 Q 366,275.2 368,272 Q 370,268.8 372,272 Q 374,275.2 376,272 Q 378,268.8 380,272 Q 382,275.2 384,272 Q 386,268.8 388,272 Q 390,275.2 392,272 Q 394,268.8 396,272 Q 398,275.2 400,272 Q 402,268.8 404,272 Q 406,275.2 408,272 Q 410,268.8 412,272 Q 414,275.2 416,272 Q 418,268.8 420,272 Q 422,275.2 424,272 Q 426,268.8 428,272 Q 430,275.2 432,272 Q 434,268.8 436,272 Q 438,275.2 440,272 Q 442,268.8 444,272 Q 446,275.2 448,272 Q 450,268.8 452,272 Q 454,275.2 456,272 Q 458,268.8 460,272 Q 462,275.2 464,272 Q 466,268.8 468,272 Q 470,275.2 472,272 Q 474,268.8 476,272 Q 478,275.2 480,272 Q 482,268.8 484,272 Q 486,275.2 488,272 Q 490,268.8 492,272 Q 494,275.2 496,272 " fill="none" stroke="black"/>
                <polygon class="arrowhead" points="576,96 564,90.4 564,101.6" fill="black" transform="rotate(0,568,96)"/>
                <polygon class="arrowhead" points="568,224 556,218.4 556,229.6" fill="black" transform="rotate(0,560,224)"/>
                <polygon class="arrowhead" points="504,272 492,266.4 492,277.6" fill="black" transform="rotate(0,496,272)"/>
                <polygon class="arrowhead" points="256,240 244,234.4 244,245.6" fill="black" transform="rotate(180,248,240)"/>
                <polygon class="arrowhead" points="248,112 236,106.4 236,117.6" fill="black" transform="rotate(180,240,112)"/>
                <polygon class="arrowhead" points="232,240 220,234.4 220,245.6" fill="black" transform="rotate(0,224,240)"/>
                <polygon class="arrowhead" points="24,224 12,218.4 12,229.6" fill="black" transform="rotate(180,16,224)"/>
                <g class="text">
                  <text x="24" y="36">Alice</text>
                  <text x="232" y="36">Bob</text>
                  <text x="500" y="36">Transparency</text>
                  <text x="568" y="36">Log</text>
                  <text x="272" y="68">(Normal</text>
                  <text x="324" y="68">reqs</text>
                  <text x="364" y="68">over</text>
                  <text x="440" y="68">authenticated</text>
                  <text x="532" y="68">channel)</text>
                  <text x="288" y="100">Search(Bob)</text>
                  <text x="396" y="116">Response{Head:</text>
                  <text x="492" y="116">6c063bb,</text>
                  <text x="548" y="116">...}</text>
                  <text x="52" y="196">(OOB</text>
                  <text x="96" y="196">check</text>
                  <text x="140" y="196">with</text>
                  <text x="184" y="196">peer)</text>
                  <text x="284" y="196">(OOB</text>
                  <text x="328" y="196">check</text>
                  <text x="372" y="196">over</text>
                  <text x="432" y="196">anonymous</text>
                  <text x="508" y="196">channel)</text>
                  <text x="152" y="228">DistinguishedHead</text>
                  <text x="312" y="228">DistinguishedHead</text>
                  <text x="48" y="244">6c063bb</text>
                  <text x="536" y="244">6c063bb</text>
                  <text x="288" y="276">Search(Bob)</text>
                  <text x="512" y="276">X</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Alice                      Bob                          Transparency Log
|                           |                                          |
|                           | (Normal reqs over authenticated channel) |
|                           |                                          |
|                           | Search(Bob) ---------------------------->|
|                           |<----------- Response{Head: 6c063bb, ...} |
|                           |                                          |
|                           |                                          |
|                           |                                          |
|                           |                                          |
|   (OOB check with peer)   |    (OOB check over anonymous channel)    |
|                           |                                          |
|<------- DistinguishedHead | DistinguishedHead ~~~~~~~~~~~~~~~~~~~~~> |
| 6c063bb ----------------->| <~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 6c063bb |
|                           |                                          |
|                           | Search(Bob) ~~~~~~~~~~~~~~~~~~~> X       |
|                           |                                          |
]]></artwork>
          </artset>
        </figure>
      </section>
    </section>
    <section anchor="deployment-modes">
      <name>Deployment Modes</name>
      <t>In the interest of satisfying the widest range of use-cases possible, three
different modes for deploying a transparency log are supported. Each mode has
slightly different requirements and efficiency considerations for both the
transparency log and the end-user.</t>
      <t><strong>Third-Party Management</strong> and <strong>Third-Party Auditing</strong> are two deployment modes
that require the transparency log to delegate part of its operation
to a third party. Users are able to run more efficiently as
long as they can assume that the transparency log and the third party won't
collude to trick them into accepting malicious results.</t>
      <t>With both third-party modes, all requests from end-users are initially routed to
the transparency log and the log coordinates with the third party
itself. End-users never contact the third party directly, although they will
need a signature public key from the third party to verify its assertions.</t>
      <t>With Third-Party Management, the third party performs the majority of the work
of actually storing and operating the service, and the transparency log only
signs new entries as they're added. With Third-Party Auditing, the transparency
log performs the majority of the work of storing and operating the service, only
obtaining signatures from a third-party auditor at regular intervals
asserting that the tree has been constructed correctly.</t>
      <t><strong>Contact Monitoring</strong>, on the other hand, supports a single-party deployment
with no third party. The cost of this is that, when a user looks up a version of
a label that was inserted very recently, the user may need to retain some
additional state and monitor the label until it is included in a <em>distinguished
log entry</em> (as defined in <xref target="PROTO"/>). If a user
looks up many label-version pairs that were inserted very recently, monitoring
may become relatively expensive.</t>
      <t>Additionally, applications that rely on a transparency log deployed in Contact
Monitoring mode <bcp14>MUST</bcp14> regularly attempt to detect forks through anonymous
communication with the transparency log or peer-to-peer communication, as
described in <xref target="detecting-forks"/>.</t>
      <t>Applications that rely on a transparency log deployed in either of the
third-party modes <bcp14>SHOULD</bcp14> allow users to enable a "Contact Monitoring Mode". This
mode, which affects only the individual client's behavior, would cause the
client to behave as if its transparency log was deployed in Contact Monitoring
mode. As such, it would start retaining state about previously looked-up labels
and regularly engaging in out-of-band communication. Enabling this
higher security mode allows users to double check that the third party is not
colluding with the transparency log.</t>
      <section anchor="contact-monitoring">
        <name>Contact Monitoring</name>
        <t>With the Contact Monitoring deployment mode, the monitoring burden is split
between both the owner of a label and those that look up the label. Stated as
simply as possible, the monitoring obligations of each party are:</t>
        <ol spacing="normal" type="1"><li>
            <t>On a regular basis, the label owner verifies that the most recent version of
their label has not changed unexpectedly.</t>
          </li>
          <li>
            <t>When a user that looked up a label sees that it was inserted very recently,
they check back later to see that the label-version pair they observed was
not removed before it could be detected by the label owner.</t>
          </li>
        </ol>
        <t>This guarantees that if a malicious value for a label is added to the log, then
either it is detected by the label owner, or if it is removed/obscured from the
log before the label owner can detect it, then any users that observed it will
detect its removal.</t>
        <figure anchor="contact-monitoring-fig">
          <name>Contact Monitoring. Alice searches for Bob's label. One day later, Alice verifies the label-version pair she observed remained in transparency log. Another day later, Bob comes online and monitors his own label. Note that Alice does not need to wait on Bob to make his Monitor request before making hers.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="272" width="584" viewBox="0 0 584 272" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,256" fill="none" stroke="black"/>
                <path d="M 296,48 L 296,256" fill="none" stroke="black"/>
                <path d="M 576,48 L 576,256" fill="none" stroke="black"/>
                <path d="M 120,64 L 288,64" fill="none" stroke="black"/>
                <path d="M 16,80 L 120,80" fill="none" stroke="black"/>
                <path d="M 128,144 L 288,144" fill="none" stroke="black"/>
                <path d="M 16,160 L 112,160" fill="none" stroke="black"/>
                <path d="M 304,224 L 456,224" fill="none" stroke="black"/>
                <path d="M 480,240 L 568,240" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="576,240 564,234.4 564,245.6" fill="black" transform="rotate(0,568,240)"/>
                <polygon class="arrowhead" points="312,224 300,218.4 300,229.6" fill="black" transform="rotate(180,304,224)"/>
                <polygon class="arrowhead" points="296,144 284,138.4 284,149.6" fill="black" transform="rotate(0,288,144)"/>
                <polygon class="arrowhead" points="296,64 284,58.4 284,69.6" fill="black" transform="rotate(0,288,64)"/>
                <polygon class="arrowhead" points="24,160 12,154.4 12,165.6" fill="black" transform="rotate(180,16,160)"/>
                <polygon class="arrowhead" points="24,80 12,74.4 12,85.6" fill="black" transform="rotate(180,16,80)"/>
                <g class="text">
                  <text x="24" y="36">Alice</text>
                  <text x="284" y="36">Transparency</text>
                  <text x="352" y="36">Log</text>
                  <text x="568" y="36">Bob</text>
                  <text x="64" y="68">Search(Bob)</text>
                  <text x="208" y="84">SearchResponse(...)</text>
                  <text x="108" y="116">(1</text>
                  <text x="136" y="116">day</text>
                  <text x="180" y="116">later)</text>
                  <text x="68" y="148">Monitor(Bob)</text>
                  <text x="204" y="164">MonitorResponse(...)</text>
                  <text x="108" y="196">(1</text>
                  <text x="136" y="196">day</text>
                  <text x="180" y="196">later)</text>
                  <text x="516" y="228">Monitor(Bob)</text>
                  <text x="388" y="244">MonitorResponse(...)</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Alice                        Transparency Log                        Bob
|                                   |                                  |
| Search(Bob) --------------------->|                                  |
|<------------- SearchResponse(...) |                                  |
|                                   |                                  |
|           (1 day later)           |                                  |
|                                   |                                  |
| Monitor(Bob) -------------------->|                                  |
|<------------ MonitorResponse(...) |                                  |
|                                   |                                  |
|           (1 day later)           |                                  |
|                                   |                                  |
|                                   |<------------------- Monitor(Bob) |
|                                   | MonitorResponse(...) ----------->|
|                                   |                                  |
]]></artwork>
          </artset>
        </figure>
        <t>Importantly, Contact Monitoring impacts how the server is able to enforce access
control on Monitor queries. While Search and Update queries can enforce access
control on a "point in time" basis, where a user is allowed to execute the query
at one point in time but maybe not the next, Monitor queries <bcp14>MUST</bcp14> have
<em>accretive</em> access control. This is because, if a user is allowed to execute a
Search or Update query for a label, the user may then need to issue at least one
Monitor query for the label some time in the future. These Monitor queries <bcp14>MUST</bcp14>
be permitted, regardless of whether or not the user is still permitted to
execute such Search or Update queries.</t>
      </section>
      <section anchor="third-party-auditing">
        <name>Third-Party Auditing</name>
        <t>With the Third-Party Auditing deployment mode, the transparency log obtains
signatures from a third-party auditor attesting to the fact that the tree has
been constructed correctly. These signatures are provided to users as part of
the responses for their queries.</t>
        <t>The third-party auditor is expected to run asynchronously, downloading and
authenticating a log's contents in the background, so as not to become a
bottleneck for the transparency log. As a result, signatures from the auditor
may lag behind the view presented by the transparency log. The maximum amount of
time that the auditor may lag behind the transparency log without its signature
being rejected by users is set in the transparency log's configuration.</t>
        <figure anchor="auditing-fig">
          <name>Third-Party Auditing. A recent signature from the auditor is provided to users. The auditor is updated on changes to the tree in the background.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="584" viewBox="0 0 584 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,192" fill="none" stroke="black"/>
                <path d="M 336,48 L 336,192" fill="none" stroke="black"/>
                <path d="M 576,48 L 576,192" fill="none" stroke="black"/>
                <path d="M 176,64 L 328,64" fill="none" stroke="black"/>
                <path d="M 160,80 L 328,80" fill="none" stroke="black"/>
                <path d="M 176,96 L 328,96" fill="none" stroke="black"/>
                <path d="M 24,110 L 64,110" fill="none" stroke="black"/>
                <path d="M 24,114 L 64,114" fill="none" stroke="black"/>
                <path d="M 480,160 L 568,160" fill="none" stroke="black"/>
                <path d="M 344,176 L 432,176" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="576,160 564,154.4 564,165.6" fill="black" transform="rotate(0,568,160)"/>
                <polygon class="arrowhead" points="352,176 340,170.4 340,181.6" fill="black" transform="rotate(180,344,176)"/>
                <polygon class="arrowhead" points="336,96 324,90.4 324,101.6" fill="black" transform="rotate(0,328,96)"/>
                <polygon class="arrowhead" points="336,80 324,74.4 324,85.6" fill="black" transform="rotate(0,328,80)"/>
                <polygon class="arrowhead" points="336,64 324,58.4 324,69.6" fill="black" transform="rotate(0,328,64)"/>
                <polygon class="arrowhead" points="32,112 20,106.4 20,117.6" fill="black" transform="rotate(180,24,112)"/>
                <g class="text">
                  <text x="20" y="36">Many</text>
                  <text x="64" y="36">Users</text>
                  <text x="324" y="36">Transparency</text>
                  <text x="392" y="36">Log</text>
                  <text x="552" y="36">Auditor</text>
                  <text x="72" y="68">Update(Alice,</text>
                  <text x="148" y="68">...)</text>
                  <text x="64" y="84">Update(Bob,</text>
                  <text x="132" y="84">...)</text>
                  <text x="72" y="100">Update(Carol,</text>
                  <text x="148" y="100">...)</text>
                  <text x="156" y="116">Response{AuditorSig:</text>
                  <text x="264" y="116">66bf,</text>
                  <text x="308" y="116">...}</text>
                  <text x="408" y="164">[AuditorUpdate]</text>
                  <text x="504" y="180">AuditorTreeHead</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Many Users                        Transparency Log               Auditor
|                                        |                             |
| Update(Alice, ...) ------------------->|                             |
| Update(Bob, ...) --------------------->|                             |
| Update(Carol, ...) ------------------->|                             |
| <===== Response{AuditorSig: 66bf, ...} |                             |
|                                        |                             |
|                                        |                             |
|                                        | [AuditorUpdate] ----------->|
|                                        |<----------- AuditorTreeHead |
|                                        |                             |
]]></artwork>
          </artset>
        </figure>
        <t>Given the long-lived nature of transparency logs and the potentially short-lived
nature of third-party auditing arrangements, KT allows third-party auditors to
start auditing a log at any arbitrary point. This allows a new third-party
auditor to start up without ingesting the transparency log's entire
history. The point at which an auditor started auditing is provided to users in
the transparency log's configuration. When verifying query responses, users
verify that the auditor started auditing at or before the point necessary for
the query to be secure.</t>
      </section>
      <section anchor="third-party-management">
        <name>Third-Party Management</name>
        <t>With the Third-Party Management deployment mode, a third party is responsible
for the majority of the work of storing and operating the log. The transparency
log serves mainly to enforce access control and authenticate the addition of new
entries to the log. All user queries are initially sent by users directly to the
transparency log, and the transparency log proxies them to the third-party
manager if they pass access control.</t>
        <figure anchor="manager-fig">
          <name>Third-Party Management. Valid requests are proxied by the transparency log to the manager. Invalid requests are blocked.</name>
          <artset>
            <artwork type="svg"><svg xmlns="http://www.w3.org/2000/svg" version="1.1" height="208" width="520" viewBox="0 0 520 208" class="diagram" text-anchor="middle" font-family="monospace" font-size="13px" stroke-linecap="round">
                <path d="M 8,48 L 8,192" fill="none" stroke="black"/>
                <path d="M 248,48 L 248,192" fill="none" stroke="black"/>
                <path d="M 512,48 L 512,192" fill="none" stroke="black"/>
                <path d="M 136,64 L 240,64" fill="none" stroke="black"/>
                <path d="M 264,64 L 504,64" fill="none" stroke="black"/>
                <path d="M 16,80 L 232,80" fill="none" stroke="black"/>
                <path d="M 256,80 L 336,80" fill="none" stroke="black"/>
                <path d="M 176,112 L 240,112" fill="none" stroke="black"/>
                <path d="M 264,112 L 504,112" fill="none" stroke="black"/>
                <path d="M 16,128 L 232,128" fill="none" stroke="black"/>
                <path d="M 256,128 L 336,128" fill="none" stroke="black"/>
                <path d="M 128,160 L 208,160" fill="none" stroke="black"/>
                <path d="M 160,176 L 208,176" fill="none" stroke="black"/>
                <polygon class="arrowhead" points="512,112 500,106.4 500,117.6" fill="black" transform="rotate(0,504,112)"/>
                <polygon class="arrowhead" points="512,64 500,58.4 500,69.6" fill="black" transform="rotate(0,504,64)"/>
                <polygon class="arrowhead" points="264,128 252,122.4 252,133.6" fill="black" transform="rotate(180,256,128)"/>
                <polygon class="arrowhead" points="264,80 252,74.4 252,85.6" fill="black" transform="rotate(180,256,80)"/>
                <polygon class="arrowhead" points="248,112 236,106.4 236,117.6" fill="black" transform="rotate(0,240,112)"/>
                <polygon class="arrowhead" points="248,64 236,58.4 236,69.6" fill="black" transform="rotate(0,240,64)"/>
                <polygon class="arrowhead" points="216,176 204,170.4 204,181.6" fill="black" transform="rotate(0,208,176)"/>
                <polygon class="arrowhead" points="216,160 204,154.4 204,165.6" fill="black" transform="rotate(0,208,160)"/>
                <polygon class="arrowhead" points="24,128 12,122.4 12,133.6" fill="black" transform="rotate(180,16,128)"/>
                <polygon class="arrowhead" points="24,80 12,74.4 12,85.6" fill="black" transform="rotate(180,16,80)"/>
                <g class="text">
                  <text x="24" y="36">Alice</text>
                  <text x="236" y="36">Transparency</text>
                  <text x="304" y="36">Log</text>
                  <text x="488" y="36">Manager</text>
                  <text x="72" y="68">Search(Alice)</text>
                  <text x="424" y="84">SearchResponse(...)</text>
                  <text x="72" y="116">Update(Alice,</text>
                  <text x="148" y="116">...)</text>
                  <text x="424" y="132">UpdateResponse(...)</text>
                  <text x="68" y="164">Search(Fred)</text>
                  <text x="224" y="164">X</text>
                  <text x="64" y="180">Update(Bob,</text>
                  <text x="132" y="180">...)</text>
                  <text x="224" y="180">X</text>
                </g>
              </svg>
            </artwork>
            <artwork type="ascii-art"><![CDATA[
Alice                  Transparency Log                  Manager
|                             |                                |
| Search(Alice) ------------->| ------------------------------>|
|<--------------------------- |<---------- SearchResponse(...) |
|                             |                                |
| Update(Alice, ...) -------->| ------------------------------>|
|<--------------------------- |<---------- UpdateResponse(...) |
|                             |                                |
| Search(Fred) ----------> X  |                                |
| Update(Bob, ...) ------> X  |                                |
|                             |                                |
]]></artwork>
          </artset>
        </figure>
        <t>The security of the Third-Party Management deployment mode comes from an
assumption that the transparency log and the third-party manager do not collude
to behave maliciously. If the third-party manager behaves honestly, then any
improper modifications to a label's value that were requested by the
transparency log will be properly published such that the label owner will
detect them when monitoring. If the transparency log behaves honestly, the
third-party manager will be unable to add any new unauthorized versions of a
label such that a user will accept them, or remove any authorized version of a
label without the label owner detecting it.</t>
        <t>The transparency log <bcp14>MUST</bcp14> implement some mechanism to detect when forks are
presented by the third-party manager. Additionally, the transparency log <bcp14>MUST</bcp14>
implement some mechanism to prevent the same version of a label from being
submitted to the third-party manager multiple times with different associated
values.</t>
      </section>
    </section>
    <section anchor="combining-logs">
      <name>Combining Logs</name>
      <t>There are many cases where it makes sense to operate multiple cooperating
transparency log instances, for example:</t>
      <ul spacing="normal">
        <li>
          <t>A service provider may wish to gradually migrate to a transparency log that
uses different cryptographic keys, a different cipher suite, or different
deployment mode.</t>
        </li>
        <li>
          <t>A service provider may operate multiple logs to improve their ability to scale
or provide higher availability.</t>
        </li>
        <li>
          <t>A federated system may allow each participant in the federation to operate
their own transparency log for their own users.</t>
        </li>
      </ul>
      <t>Client implementations <bcp14>SHOULD</bcp14> generally be prepared to interact with multiple
independent transparency logs. When multiple transparency logs are used as part
of one application, all users <bcp14>MUST</bcp14> have a consistent policy for executing
Search, Update, and Monitor queries against the logs in a way that maintains the
high-level security guarantees of KT:</t>
      <ul spacing="normal">
        <li>
          <t>If all transparency logs behave honestly, then users observe a globally
consistent view of the data associated with each label.</t>
        </li>
        <li>
          <t>If any transparency log behaves dishonestly such that the prior guarantee is
not met, this will be detected in a timely manner by background monitoring or
out-of-band communication.</t>
        </li>
      </ul>
      <section anchor="gradual-migration">
        <name>Gradual Migration</name>
        <t>In the case of gradually migrating from an old transparency log to a new one,
this policy may look like:</t>
        <ol spacing="normal" type="1"><li>
            <t>Search queries should be executed against the old transparency log first, and
then against the new transparency log only if the most recent version of a
label in the old transparency log is a special application-defined
'tombstone' entry.</t>
          </li>
          <li>
            <t>Update queries should only be executed against the new transparency log, with
the exception of adding a tombstone entry for the label to the old
transparency log if one hasn't been added already.</t>
          </li>
          <li>
            <t>Both transparency logs should be monitored as they would be if they were run
individually. Once the migration has completed and the old transparency log
has stopped accepting modifications, the old transparency log <bcp14>MUST</bcp14> stay
operational long enough for all users to complete their monitoring of it
(keeping in mind that some users may be offline for a significant amount of
time).</t>
          </li>
        </ol>
        <t>Placing a tombstone entry for each label in the old transparency log gives users
a clear indication as to which transparency log contains the most recent version
of a label. Importantly, it prevents users from incorrectly accepting a stale
version of a label if the new transparency log is unreachable.</t>
      </section>
      <section anchor="immediate-migration">
        <name>Immediate Migration</name>
        <t>In some situations, the service provider may instead choose to stop adding new
entries to a transparency log immediately and provide a new transparency log
that is pre-populated with the most recent versions of all labels. In this case,
the policy may look like:</t>
        <ol spacing="normal" type="1"><li>
            <t>Search queries must be executed against the new transparency log.</t>
          </li>
          <li>
            <t>Update queries must be executed against the new transparency log.</t>
          </li>
          <li>
            <t>The final tree size and root hash of the old transparency log is provided to
users over a trustworthy channel. Users issue their final Monitor queries to
complete monitoring up to this point. Label owners initiate monitoring state
for the new transparency log by processing an Update for the migrated
versions of their labels and verifying that the migration was done correctly.
From then on, users will monitor only the new transparency log.</t>
          </li>
        </ol>
        <t>The final tree size and root hash of the prior transparency log need to be
distributed to users in a way that guarantees all users have a globally
consistent view. This can be done by storing them in a well-known label of the
new transparency log. Users <bcp14>MUST</bcp14> process this well-known label as if they own
it, so that they continue to monitor it for unexpected changes for the duration
of the migration period. Alternatively, the final tree size and root hash may be
distributed with the application's code distribution mechanism.</t>
      </section>
      <section anchor="federation">
        <name>Federation</name>
        <t>In a federated application, many servers that are owned and operated by
different entities will cooperate to provide a single end-to-end encrypted
communication service. Each entity in a federated system provides its own
infrastructure (in particular, a transparency log) to serve the users that rely
on it. Given this, there <bcp14>MUST</bcp14> be a consistent policy for directing KT requests
to the correct transparency log. Typically in such a system, the end-user
identity directly specifies which entity requests should be directed to. For
example, with an email end-user identity like <tt>alice@example.com</tt>, the
controlling entity is <tt>example.com</tt>.</t>
        <t>A controlling entity like <tt>example.com</tt> <bcp14>MAY</bcp14> act as an anonymizing proxy for its
users when they query transparency logs run by other entities (in the manner of
<xref target="RFC9458"/>), but <bcp14>SHOULD NOT</bcp14> attempt to 'mirror' or combine other transparency
logs with its own.</t>
      </section>
    </section>
    <section anchor="pruning">
      <name>Pruning</name>
      <t>As part of the core infrastructure of an end-to-end encrypted communication
service, transparency logs are required to operate seamlessly for several years.
This presents a problem for general append-only logs, as even moderate usage can
cause the log to grow to an unmanageable size in that time frame. This issue is
further compounded by the fact that a substantial portion of the entries added
to a log may be fake, having been added solely for the purpose of obscuring
short-term update rates (discussed in <xref target="privacy-guarantees"/>). Given this,
transparency logs need to be able manage their footprint by pruning data which
is no longer required by the communication service.</t>
      <t>Broadly speaking, a transparency log's database will contain two types of data:</t>
      <ol spacing="normal" type="1"><li>
          <t>Serialized user data (the values corresponding to labels in the log), and</t>
        </li>
        <li>
          <t>Cryptographic data, such as pre-computed portions of hash trees or commitment
openings.</t>
        </li>
      </ol>
      <t>The first type, serialized user data, can be pruned by removing any entries that
have either expired, or to which the service operator's access control policy
would never permit access. A version of a label expires when it is no longer
possible to produce a valid search proof for the label-version pair, which
happens when all of the necessary log entries have passed their <strong>maximum
lifetime</strong> (as defined in <xref target="PROTO"/>).</t>
      <t>Notably, the greatest version of a label is the only version that never expires
through the maximum lifetime mechanism. However, service operators may define
arbitrary access control policies that permanently block access to the greatest
(or any other versions) of a label. The values corresponding to these
label-version pairs may also be deleted without consideration to the rest of the
protocol.</t>
      <t>The second type of data, cryptographic data, can also be pruned, but only after
considering which parts are no longer required by the protocol for producing
proofs. For example, even though a particular version of a label may have been
deleted, the corresponding VRF output and commitment may still need to exist in
the latest version of the transparency log's prefix tree to produce valid search
proofs for other versions of the label. The exact mechanism for determining
which data is safe to delete will depend on the protocol and implementation.</t>
      <t>The distinction between user data and cryptographic data provides a valuable
separation of concerns since <xref target="PROTO"/> does not provide a way for a service
operator to convey its access control policy to a transparency log. That is, it
allows the pruning of user data to be done entirely by application-defined code,
while the pruning of cryptographic data can be done entirely by KT-specific code
as a subsequent operation.</t>
    </section>
    <section anchor="security-guarantees">
      <name>Security Guarantees</name>
      <t>A user that correctly verifies a proof from the transparency log and does any
required monitoring afterwards receives a guarantee that the transparency log
operator executed the operation correctly, and in a way that's globally
consistent with what it has shown all other users. That is, when a user searches
for a label, they're guaranteed that the result they receive represents the same
result that any other user searching for the same label at roughly the same time
would've seen. When a user modifies a label, they're guaranteed that other users
will see the modification within a bounded amount of time.</t>
      <t>If the transparency log does not execute an operation correctly, then either:</t>
      <ol spacing="normal" type="1"><li>
          <t>The user will detect the error immediately and reject the proof, or</t>
        </li>
        <li>
          <t>The user will permanently enter an invalid state.</t>
        </li>
      </ol>
      <t>Depending on the exact reason that the user enters an invalid state, it will
either be detected by background monitoring or by the mechanisms described in
<xref target="detecting-forks"/>. Importantly, this means that users must stay online for
a bounded amount of time after entering an invalid state for it to be
successfully detected.</t>
      <t>Alternatively, instead of executing a lookup incorrectly, the transparency log
can attempt to prevent a user from learning about more recent states of the log.
This would allow the log to continue executing queries correctly, but on
stale versions of data. To prevent this, applications configure an upper
bound on how stale a query response can be without being rejected.</t>
      <t>The exact caveats of the above guarantees depend naturally on the security of
the underlying cryptographic primitives and also the deployment mode that the
transparency log relies on:</t>
      <ul spacing="normal">
        <li>
          <t>Third-Party Management and Third-Party Auditing require an assumption that the
transparency log and the third-party manager or auditor do not collude
to trick users into accepting malicious results.</t>
        </li>
        <li>
          <t>Contact Monitoring requires an assumption that the user that owns a label and
all users that look up the label do the necessary monitoring afterwards.</t>
        </li>
      </ul>
      <t>In short, assuming that the underlying cryptographic primitives used are secure,
any deployment-specific assumptions hold (such as non-collusion), and that user
devices don't go permanently offline, then malicious behavior by the
transparency log is always detected within a bounded amount of time. The
parameters that determine the maximum amount of time before malicious behavior
is detected are as follows:</t>
      <ul spacing="normal">
        <li>
          <t>The configured maximum amount of time by which a query response can be stale.</t>
        </li>
        <li>
          <t>The configured Reasonable Monitoring Window (described in
<xref section="7.1" sectionFormat="of" target="PROTO"/>), weighed against how frequently users execute
background monitoring in practice.</t>
        </li>
        <li>
          <t>For logs that use the Contact Monitoring deployment mode: how frequently users
engage in anonymous communication with the transparency log, or peer-to-peer
communication with other users.</t>
        </li>
        <li>
          <t>For logs that use the Third-Party Auditing deployment mode: the configured
maximum acceptable lag for an auditor.</t>
        </li>
        <li>
          <t>For logs that use the Third-Party Management deployment mode: the amount of
lag, or potential inefficacy, of the service operator's approach to detecting
forks.</t>
        </li>
      </ul>
      <section anchor="state-loss">
        <name>State Loss</name>
        <t>The security of KT often depends on the ability of users to maintain robust
local state. Users that lose their state in a Contact Monitoring or Third-Party
Auditing deployment will have a correspondingly reduced ability to detect if
they were shown a fork, or if the transparency log later obscured data that they
consumed.</t>
        <t>In a Contact Monitoring deployment mode, this can happen when a user loses their
state after consuming a version of a label that was created either within the
Reasonable Monitoring Window, or within a portion of the log that was
insufficiently gossipped. In a Third-Party Auditing deployment mode, this can
happen when a user loses their state after consuming a version of a label that
was created within the auditor's maximum acceptable lag.</t>
        <t>Applications should consider the nature of possible state loss in their clients
when configuring a transparency log and <bcp14>MUST</bcp14> ensure that the relevant protocol
parameters are set in a way that appropriately mitigates this risk.
For example, in a Contact Monitoring deployment, the Reasonable Monitoring
Window and the duration between out-of-band communication attempts <bcp14>SHOULD</bcp14> be
much less than the typical time between state loss events. Similarly, in a
Third-Party Auditing deployment, the maximum acceptable lag for an auditor
<bcp14>SHOULD</bcp14> be much less than the typical time between state loss events.</t>
        <t>In applications where client state is typically ephemeral (like a web page), or
where state loss could possibly be triggered adversarially, a Third-Party
Management deployment mode is <bcp14>RECOMMENDED</bcp14>. Alternatively, applications could
also consider implementing a policy of not consuming label-version pairs that
were inserted too recently. Once a label-version pair is outside of the
Reasonable Monitoring Window in a Contact Monitoring deployment, or beyond the
maximum acceptable auditor lag in a Third-Party Auditing deployment, the risks
associated with state loss are often already sufficiently mitigated.</t>
      </section>
      <section anchor="privacy-guarantees">
        <name>Privacy Guarantees</name>
        <t>For applications deploying KT, service operators expect to be able to control
when sensitive information is revealed. In particular, a service operator can
often only reveal that a user is a member of their service, and information
about that user's account, to that user's friends or contacts.</t>
        <t>KT only allows users to learn whether or not a label exists in the
transparency log if the user obtains a valid search proof for that label.
Similarly, KT only allows users to learn about the value of a label if
the user obtains a valid search proof for that exact version of the label.</t>
        <t>When a user was previously allowed to lookup or change a label's value but no
longer is, KT prevents the user from learning whether or not the label's value
has changed since the user's access was revoked. This is true even in Contact
Monitoring mode, where users are still permitted to perform monitoring after
their access to perform other queries has been revoked.</t>
        <t>Applications determine the privacy of data in KT by
relying on these properties when they enforce access control policies on the
queries issued by users, as discussed in <xref target="protocol-overview"/>. For example if
two users aren't friends, an application can block these users from searching
for each other's labels. This prevents both users from learning about
each other's existence. If the users were previously friends but no longer are,
the application can prevent the users from searching for each other's labels and
learning the contents of any subsequent account updates.</t>
        <t>Service operators also expect to be able to control sensitive population-level
metrics about their users. These metrics include the size of their user base, the
frequency with which new users join, and the frequency with which existing users
update their labels.</t>
        <t>KT allows a service operator to obscure the size of its user base by batch
inserting a large number of fake label-version pairs when a transparency log is
first initialized. Similarly, KT also allows a service operator to obscure the
rate at which "real" changes are made to the transparency log by padding "real"
changes with the insertion of other fake label-version pairs, such that it
creates the outside appearance of a constant baseline rate of insertions.</t>
        <section anchor="leakage-to-third-party">
          <name>Leakage to Third-Party</name>
          <t>In the event that a third-party auditor or manager is used, there's additional
information leaked to the third-party that's not visible to outsiders.</t>
          <t>In the case of a third-party auditor, the auditor is able to learn the total
number of distinct changes to the log. It is also able to learn the order and
approximate timing with which each change was made. However, auditors are not
able to learn the plaintext of any labels or values. This is because labels
are masked with a VRF, and values are only provided to auditors as commitments.
They are also not able to distinguish between whether a change represents a label
being created for the first time or being updated, or whether a change
represents a "real" change from an end-user or a "fake" padding change.</t>
          <t>In the case of a third-party manager, the manager generally learns everything
that the service operator would know. This includes the total set of plaintext
labels and values and their modification history. It also includes traffic
patterns, such as how often a specific label is looked up.</t>
        </section>
      </section>
    </section>
    <section anchor="privacy-law-considerations">
      <name>Privacy Law Considerations</name>
      <t>Consumer privacy laws often provide a <em>right to erasure</em>. This means that when a
consumer requests that a service provider delete their personal information, the
service provider is legally obligated to do so. This may seem to be incompatible
with the description of KT in <xref target="introduction"/> as an "append-only log". Once an
entry is added to a transparency log, it indeed can not be removed. The
important caveat here is that user data is not directly stored in the
append-only log. Instead, it primarily contains privacy-preserving VRF outputs
and cryptographic commitments.</t>
      <t>The value corresponding to a label is typically some serialized user account
data, like a public key or internal identifier. KT uses cryptographic
commitments to ensure that users interacting with a transparency log are unable
to learn anything about a label's value until the transparency log explicitly
provides the commitment's opening. A transparency log responding to an erasure
request can delete the commitment opening and the associated data. This can be
done immediately and permanently prevents recovery of the associated value.</t>
      <t>Labels themselves are typically serialized end-user identifiers, like a username
or email address. All labels are processed through a Verifiable Random Function,
or VRF <xref target="RFC9381"/>, which deterministically maps each label to a fixed-length
pseudorandom value. The set of all labels stored in a transparency log is
committed to by a prefix tree, and each version of the prefix tree is committed
to by a log tree.</t>
      <t>While all the VRF outputs corresponding to labels affected by an erasure request
can be deleted from the most recent version of the prefix tree immediately,
previous versions of the prefix tree will still contain the VRF outputs and will
still be needed by the protocol for a bounded amount of time. This bound is
defined by the log entry maximum lifetime discussed in <xref target="PROTO"/>. As such, the
VRF outputs can only be fully purged from the transparency log once all log
entries that contain them have passed their maximum lifetime. After this point,
they are no longer necessary for the protocol to operate.</t>
    </section>
    <section anchor="implementation-guidance">
      <name>Implementation Guidance</name>
      <t>Fundamentally, KT can be thought of as guaranteeing that all the users of a
service agree on the contents of a key-value database (noting that this document
refers to these keys as "labels"). It takes special care to turn the guarantee
that all users agree on a set of labels and values into a guarantee that the
mapping between end-users and their public keys is authentic. Critically, to
authenticate an end-user identity, it must be both <em>unique</em> and <em>user-visible</em>.
However, what exactly constitutes a unique and user-visible identifier varies
greatly from application to application.</t>
      <t>Consider, for example, a communication service where users are uniquely
identified by a fixed username, but KT has been deployed using each user's
internal UUID as their label. While the UUID might be unique, it is not
necessarily user-visible. When a user attempts to lookup a contact by username,
the service operator translates the username into a user UUID under the hood. If
this mapping (from username to UUID) is unauthenticated, the service operator
could manipulate it to eavesdrop on conversations by returning the UUID for an
account that it controls. From a security perspective, this would be equivalent
to not using KT at all.</t>
      <t>However, that's not to say that the use of internal UUIDs in KT is never
appropriate. Many applications don't have a concept of a fixed explicit
identifier, like a username, and instead rely on their UI (underpinned
internally by a user's ID) to indicate to users whether a conversation is with a
new person or someone they've previously contacted. The fact that the UI behaves
this way makes the user's ID a user-visible identifier even if a user may not be
able to actually see it written out. An example of this kind of application
would be Slack.</t>
      <t>A <strong>primary end-user identity</strong> is one that is unique, user-visible, and unable
to change. (Or equivalently, if it changes, it appears in the application UI as
a new conversation with a new user.) An example of this type of identifier would
be an email address on an email service. A primary end-user identity <bcp14>SHOULD</bcp14>
always be a label in KT, with the end-user's public keys and other account
information as the associated value.</t>
      <t>A <strong>secondary end-user identity</strong> is one that is unique, user-visible, and able
to change without being interpreted as a different account due to its
association with a primary end-user identity. These identities are used solely
for initial user discovery, during which they're converted into a primary
end-user identity (like a UUID) that's used by the application to identify the
end-user from then on. An example of this type of identity would be a username,
since users can often change their username without disrupting existing
communications. A secondary end-user identity <bcp14>SHOULD</bcp14> be a label in KT with the
primary end-user identity as the associated value, such that it can be used to
authenticate the user discovery process.</t>
      <t>While likely helpful to most common applications, the distinction between
handling primary and secondary end-user identities is not a guaranteed rule.
Applications must be careful to ensure they fully capture the semantics of
identity in their application with the labels and values they store in KT.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="PROTO">
          <front>
            <title>Key Transparency Protocol</title>
            <author fullname="Brendan McMillion" initials="B." surname="McMillion">
         </author>
            <author fullname="Felix Linker" initials="F." surname="Linker">
         </author>
            <date day="19" month="October" year="2025"/>
            <abstract>
              <t>   While there are several established protocols for end-to-end
   encryption, relatively little attention has been given to securely
   distributing the end-user public keys for such encryption.  As a
   result, these protocols are often still vulnerable to eavesdropping
   by active attackers.  Key Transparency is a protocol for distributing
   sensitive cryptographic information, such as public keys, in a way
   that reliably either prevents interference or detects that it
   occurred in a timely manner.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-keytrans-protocol-03"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="sealed-sender" target="https://signal.org/blog/sealed-sender/">
          <front>
            <title>Technology preview: Sealed sender for Signal</title>
            <author>
              <organization/>
            </author>
            <date year="2018" month="October" day="29"/>
          </front>
        </reference>
        <reference anchor="RFC6962">
          <front>
            <title>Certificate Transparency</title>
            <author fullname="B. Laurie" initials="B." surname="Laurie"/>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="E. Kasper" initials="E." surname="Kasper"/>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document describes an experimental protocol for publicly logging the existence of Transport Layer Security (TLS) certificates as they are issued or observed, in a manner that allows anyone to audit certificate authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.</t>
              <t>Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6962"/>
          <seriesInfo name="DOI" value="10.17487/RFC6962"/>
        </reference>
        <reference anchor="RFC9420">
          <front>
            <title>The Messaging Layer Security (MLS) Protocol</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="B. Beurdouche" initials="B." surname="Beurdouche"/>
            <author fullname="R. Robert" initials="R." surname="Robert"/>
            <author fullname="J. Millican" initials="J." surname="Millican"/>
            <author fullname="E. Omara" initials="E." surname="Omara"/>
            <author fullname="K. Cohn-Gordon" initials="K." surname="Cohn-Gordon"/>
            <date month="July" year="2023"/>
            <abstract>
              <t>Messaging applications are increasingly making use of end-to-end security mechanisms to ensure that messages are only accessible to the communicating endpoints, and not to any servers involved in delivering messages. Establishing keys to provide such protections is challenging for group chat settings, in which more than two clients need to agree on a key but may not be online at the same time. In this document, we specify a key establishment protocol that provides efficient asynchronous group key establishment with forward secrecy (FS) and post-compromise security (PCS) for groups in size ranging from two to thousands.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9420"/>
          <seriesInfo name="DOI" value="10.17487/RFC9420"/>
        </reference>
        <reference anchor="RFC9458">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="C. A. Wood" initials="C. A." surname="Wood"/>
            <date month="January" year="2024"/>
            <abstract>
              <t>This document describes Oblivious HTTP, a protocol for forwarding encrypted HTTP messages. Oblivious HTTP allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9458"/>
          <seriesInfo name="DOI" value="10.17487/RFC9458"/>
        </reference>
        <reference anchor="RFC9381">
          <front>
            <title>Verifiable Random Functions (VRFs)</title>
            <author fullname="S. Goldberg" initials="S." surname="Goldberg"/>
            <author fullname="L. Reyzin" initials="L." surname="Reyzin"/>
            <author fullname="D. Papadopoulos" initials="D." surname="Papadopoulos"/>
            <author fullname="J. Včelák" initials="J." surname="Včelák"/>
            <date month="August" year="2023"/>
            <abstract>
              <t>A Verifiable Random Function (VRF) is the public key version of a keyed cryptographic hash. Only the holder of the secret key can compute the hash, but anyone with the public key can verify the correctness of the hash. VRFs are useful for preventing enumeration of hash-based data structures. This document specifies VRF constructions based on RSA and elliptic curves that are secure in the cryptographic random oracle model.</t>
              <t>This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9381"/>
          <seriesInfo name="DOI" value="10.17487/RFC9381"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
