Internet-Draft | Privacy Pass MoQ Auth | October 2025 |
Nandakumar, et al. | Expires 23 April 2026 | [Page] |
This document specifies the use of Privacy Pass architecture and issuance protocols for authorization in Media over QUIC (MoQ) transport protocol. It defines how Privacy Pass tokens can be integrated with MoQ's authorization framework to provide privacy-preserving authentication for subscriptions, fetches, publications, and relay operations while supporting fine-grained access control through prefix-based track namespace and track name matching rules.¶
This note is to be removed before publishing as an RFC.¶
The latest revision of this draft can be found at https://moq-wg.github.io/privacy-pass/draft-ietf-moq-privacy-pass-auth.html. Status information for this document may be found at https://datatracker.ietf.org/doc/draft-ietf-moq-privacy-pass-auth/.¶
Discussion of this document takes place on the Media Over QUIC Working Group mailing list (mailto:moq@ietf.org), which is archived at https://mailarchive.ietf.org/arch/browse/moq/. Subscribe at https://www.ietf.org/mailman/listinfo/moq/. Working Group information can be found at https://datatracker.ietf.org/wg/moq/.¶
Source for this draft and an issue tracker can be found at https://github.com/moq-wg/privacy-pass.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 23 April 2026.¶
Copyright (c) 2025 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Revised BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Revised BSD License.¶
Media over QUIC (MoQ) [MoQ-TRANSPORT] provides a transport protocol for live and on-demand media delivery, real-time communication, and interactive content distribution over QUIC connections. The protocol supports a wide range of applications including video streaming, video conferencing, gaming, interactive broadcasts, and other latency-sensitive use cases. MoQ includes mechanisms for authorization through tokens that can be used to control access to media streams, interactive sessions, and relay operations.¶
Traditional authorization mechanisms often lack the privacy protection needed for modern media distribution scenarios, where users' viewing patterns and content preferences should remain private while still enabling fine-grained access control, namespace restrictions, and operational constraints.¶
Privacy Pass [RFC9576] provides a privacy-preserving authorization architecture that enables anonymous authentication through unlinkable tokens. The Privacy Pass architecture consists of four entities: Client, Origin, Issuer, and Attester, which work together to provide token-based authorization without compromising user privacy. The issuance protocols [RFC9578] define how these tokens are created and verified.¶
This document defines how Privacy Pass tokens can be integrated with MoQ's authorization framework to provide comprehensive access control for media streaming, real-time communication, and interactive content services while preserving user privacy through unlinkable authentication tokens.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
Privacy Pass Terminology defined in Section 2 of [RFC9576] is reused here. The Privacy Pass MoQ integration involves the following entities and their interactions:¶
Client: The MoQ client requesting access to media content. The client is responsible for obtaining Privacy Pass tokens through the attestation and issuance process, and presenting these tokens when requesting MoQ operations.¶
MoQ Relay/Origin: The MoQ relay server or origin that forwards media content and requires authorization. The relay validates Privacy Pass tokens, enforces access policies, and forwards authorized requests to origins or other relays. Relays maintain configuration for trusted issuers and validate token signatures and metadata.¶
Privacy Pass Issuer: The entity that issues Privacy Pass tokens to clients after successful attestation. The issuer operates the token issuance protocol, manages cryptographic keys. The issuer creates tokens with appropriate MoQ-specific metadata.¶
Privacy Pass Attester: The entity that attests to properties of clients for the purposes of token issuance. The attester verifies client credentials, subscription status, or other eligibility criteria. Common attestation methods include username/password, OAuth, device certificates, or other authentication mechanisms.¶
In the below deployment, the MoQ relay and Privacy Pass issuer are operated by different entities to enhance privacy through separation of concerns. This corresponds to Section 4.4 of [RFC9576].¶
In certain deployments the MoQ relay and Privacy Pass issuer may be operated by the same entity to simplify key management and policy coordination. This is the Privacy Pass deployment described in Section 4.2 of [RFC9576].¶
The architecture assumes the following trust relationships based on Section 3 of [RFC9576]:¶
This section describes how Privacy Pass tokens are integrated into the MoQ transport protocol to provide privacy-preserving authorization for various media operations.¶
This specification uses the below existing Privacy Pass token types:¶
Publicly verifiable token types¶
0x0002 (Blind RSA (2048-bit))
: Defined in Section 6 of [RFC9578]. Uses
blind RSA signatures ([RFC9474]) for deployments requiring distributed validation
across multiple relays.¶
Privately verifiable token types¶
0x0001 (VOPRF(P-384, SHA-384))
: Defined in Section 6 of [RFC9578]. Uses VOPRF ([RFC9497]) for
deployments where the origin is the issuer. Issuance can be batched as defined in Section 5 of [PRIVACYPASS-BATCHED].¶
0x0005 (VOPRF(ristretto255, SHA-512))
: Defined in Section 8.1 of [PRIVACYPASS-BATCHED]. Uses VOPRF ([RFC9497]) for
deployments where the origin is the issuer. Issuance can be batched as defined in Section 5 of [PRIVACYPASS-BATCHED].¶
0xE5AC (ARC(P-256))
: Anonymous Rate Limit Credentials Token using [ARC].
Tokens are presented by clients based on an issued credential and up to a presentation_limit
.¶
Privacy Pass tokens used in MoQ MUST follow the structure defined in Section 2.2 of [RFC9577] for the PrivateToken HTTP authentication scheme. The token structure includes:¶
Token Type: 2-byte identifier specifying the issuance protocol used¶
Nonce: 32-byte client-generated random value for uniqueness¶
Challenge Digest: 32-byte SHA-256 hash of the TokenChallenge¶
Token Key ID: Variable-length identifier for the issuer's public key¶
Authenticator: Variable-length cryptographic proof bound to the token¶
MoQ-specific TokenChallenge structures use the default format defined in Section 2.1 of [RFC9577] with MoQ-specific parameters in the origin_info field:¶
struct { uint16_t token_type; opaque issuer_name<1..2^16-1>; opaque redemption_context<0..32>; opaque origin_info<0..2^16-1>; } TokenChallenge;¶
For MoQ usage, the origin_info field contains MoQ-specific authorization scope information encoded as a UTF-8 string with the following format:¶
TODO: Define origin_info to be binary format using TLS presentation language For anonymous credentials, it would make a lot more sense to use redemption_context instead of origin_info, as redemption_context is decided upon at presentation time rather than at issuance time. Question that I don't have the answer yet: are 32-bytes enough? we might need to say something like "first 2 bytes represent the type of rule, then data"¶
moq-scope = operation ":" namespace-pattern [":" track-pattern] operation = "subscribe" / "fetch" / "publish" / "announce" namespace-pattern = exact-match / prefix-match track-pattern = exact-match / prefix-match exact-match = namespace/name-string prefix-match = namespace/name-string"*"¶
Examples:¶
This specification defines prefix-based matching rules for track namespaces and track names to enable fine-grained access control while maintaining privacy.¶
Track namespace matching supports three modes:¶
Exact Match:¶
Pattern: "example.com/live/sports/soccer"
¶
Matches: Only the exact namespace example.com/live/sports/soccer
¶
Prefix Match:¶
Track name matching within authorized namespaces follows the same pattern:¶
Exact Match:¶
Prefix Match:¶
When a MoQ relay receives a request with a Privacy Pass token, it performs the following validation steps to determine whether to authorize the requested operation:¶
Extract the Privacy Pass token from the MoQ control message (SETUP, SUBSCRIBE, FETCH, PUBLISH, or ANNOUNCE)¶
Verify the token signature using the appropriate issuer public key based on the token type:¶
Validate that the token has not been replayed by checking:¶
Extract the MoQ-specific authorization scope from the token's origin_info field:¶
Verify that the requested MoQ operation matches the operation specified in the token scope:¶
Apply namespace/name matching rules based on the pattern type:¶
Access is granded to the requested resource if and only if ALL of the following conditions are met:¶
Token signature verification succeeds¶
Token nonce has not been previously used (replay protection)¶
Token has not expired (if applicable)¶
Requested operation matches token operation scope¶
Requested namespace matches token namespace pattern¶
Requested track name matches token track name pattern (if specified) specified)¶
else, authorzation error is returned to the requesting client.¶
Privacy Pass tokens are provided to MoQ relays using the existing MoQ authorization framework with the following adaptations:¶
TODO: Add considerations for the security and privacy of the Privacy Pass tokens.¶
TODO¶
TODO acknowledge.¶
RFC Editor's Note: Please remove this section prior to publication of a final version of this document.¶