<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-fatt-extension-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Extensions to TLS FATT Process</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-fatt-extension-02"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 67?>

<t>This document applies only to non-trivial extensions of TLS, which require formal analysis. It proposes the authors provide a threat model and informal security goals in the Security Considerations section, as well as motivation and a protocol diagram in the draft.
We also briefly present a few pain points of the team doing the formal analysis which -- we believe -- require refining the process:</t>
      <ul spacing="normal">
        <li>
          <t>Contacting FATT</t>
        </li>
        <li>
          <t>Understanding the opposing goals</t>
        </li>
        <li>
          <t>No response from some authors</t>
        </li>
        <li>
          <t>Slots at meeting</t>
        </li>
        <li>
          <t>Provide protection against FATT-bypass by other TLS-related WGs</t>
        </li>
        <li>
          <t>Process not being followed</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/tls-fatt-extension/draft-usama-tls-fatt-extension.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-fatt-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/tls-fatt-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 80?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While the TLS FATT process <xref target="TLS-FATT"/> marks a historic change in achieving high cryptographic assurances by tightly integrating formal methods in the working group (WG) process, the current FATT process has some practical limitations. Given a relatively smaller formal methods community, and a steep learning curve as well as very low consideration of usability in the existing formal analysis tools, this document proposes some solutions to make the FATT process sustainable.</t>
      <t>Specifically, the TLS FATT process does not outline the division of responsibility between the authors and the team doing the formal analysis (the latter is hereafter referred to as the "Verifier"). This document aims to propose some solutions without putting an extensive burden on either party.</t>
      <t>An argument is often presented by the authors that an Internet-Draft is written for the implementers. We make several counter-arguments here:</t>
      <ul spacing="normal">
        <li>
          <t>Researchers and protocol designers are also stakeholders of such specifications <xref target="I-D.irtf-cfrg-cryptography-specification"/>.</t>
        </li>
        <li>
          <t>Even implementers may like to understand the security implications before blindly starting to implement it.</t>
        </li>
        <li>
          <t>With the FATT process, this argument is clearly invalid. The Verifier may not be the same as the implementer.</t>
        </li>
      </ul>
      <t>This document outlines the corresponding changes in the way Internet-Drafts are typically written.
For the Internet-Draft to be useful for the formal analysis, this document proposes that the draft should contain four main items, namely:</t>
      <ul spacing="normal">
        <li>
          <t>motivation,</t>
        </li>
        <li>
          <t>a threat model,</t>
        </li>
        <li>
          <t>informal security goals, and</t>
        </li>
        <li>
          <t>a protocol diagram (<xref target="sec-prot-diagram"/>).</t>
        </li>
      </ul>
      <t>Each one of these is summarized in <xref target="sec-res-authors"/>. Future versions of this draft will include concrete examples.</t>
      <t>Responsibilities of the Verifier are summarized in <xref target="sec-res-verifier"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>A clear separation of responsibilities would help IRTF UFMRG to train the authors and verifiers separately to fulfill their own responsibilities.</t>
        <t>Moreover, we believe that the experiences can help improve the FATT process.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is only non-trivial extensions of TLS, which require formal analysis.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="sec-prot-diagram">
        <name>Protocol Diagram</name>
        <t>In the context of this document, a Protocol Diagram specifies the proposed cryptographically-relevant changes compared to the standard TLS protocol <xref target="I-D.ietf-tls-rfc8446bis"/>. This is conceptually similar to the Protocol Model in <xref target="RFC4101"/>. However, while <xref target="RFC4101"/> only recommends diagrams, we consider diagrams to be essential.</t>
      </section>
      <section anchor="verifier">
        <name>Verifier</name>
        <t>In this document, the Verifier refers to the person (team) doing the formal analysis.</t>
      </section>
      <section anchor="definition-of-attack">
        <name>Definition of Attack</name>
        <t>Any ambiguity originating from the threat model, informal security goals, and a Protocol Diagram is to be considered as an attack.
The authors are, therefore, encouraged to be as precise as possible.
The Verifier may propose text for consideration by authors/WG to disambiguate or propose a fix to the attack.</t>
      </section>
    </section>
    <section anchor="sec-pain-points">
      <name>Pain Points of Verifier</name>
      <t>From the two extremes -- <xref target="I-D.ietf-tls-8773bis"/> where Russ kindly provided all requested inputs and we were able to get it through (with a <eref target="https://mailarchive.ietf.org/arch/msg/tls/6Wk82oBGd61rTK23DgfYb7BmRKM/">small change</eref>) without any formal analysis to <xref target="I-D.fossati-tls-attestation-08"/> where formal analysis revealed vulnerabilities <xref target="ID-Crisis"/> and resulted in a separate WG to tackle this problem -- we summarize the pain points of the Verifier with the hope that we can refine the process.</t>
      <t>Note that we are not at all asserting that the authors have no pain points. They very likely have their own -- that is another indication that the process needs a refinement.</t>
      <section anchor="provide-protection-against-fatt-bypass-by-other-tls-related-wgs">
        <name>Provide Protection Against FATT-bypass by Other TLS-related WGs</name>
        <t>TLS-related WGs in particular those where the representation of TLS WG is a minority -- including the one (SEAT WG) that the author has defended himself as one of the six proponents -- <bcp14>MUST NOT</bcp14> be allowed to make changes to the TLS protocol beyond what is explicitly allowed in their charter.</t>
        <t>If rechartering of such WGs is <em>absolutely unavoidable</em> and includes non-trivial changes to the TLS protocol, it <bcp14>MUST</bcp14> only be done after agreement with the TLS WG. This will prevent the short-circuit path for FATT. If the WG does not have proper FATT-like process, TLS WG may request FATT review before WGLC.</t>
        <t>In short, our concern is:</t>
        <artwork><![CDATA[
What's the point of such a TLS FATT process when other WGs
can simply bypass this process to make key schedule level changes?
]]></artwork>
        <t>For example, <xref target="I-D.fossati-seat-early-attestation-00"/> makes key schedule level changes, breaks the SEAT WG charter and SEAT WG has no formal FATT-like process.</t>
      </section>
      <section anchor="process-not-being-followed">
        <name>Process not being followed</name>
        <t>The process <xref target="TLS-FATT"/> states:</t>
        <blockquote>
          <t>When a document is adopted by the working group the chairs will make a determination whether the change proposed by the document requires review by the FATT to determine if formal protocol analysis is necessary for the change. For example a proposal that modifies the TLS key schedule or the authentication process or any other part of the cryptographic protocol that has been formally modeled and analyzed in the past would likely result in asking the FATT, whereas a change such as modifying the SSLKEYLOG format would not. The working group chairs will inform the working group of this decision.</t>
        </blockquote>
        <t>However, such information has not been provided to the WG for at least the following 2 documents:</t>
        <section anchor="ml-kem">
          <name>ML-KEM</name>
          <t>For the draft <xref target="I-D.ietf-tls-mlkem"/>, the <eref target="https://mailarchive.ietf.org/arch/msg/tls/L2bWqpT3q8HVmACwD1Ta3NFimw0/">chairs acknowledge</eref> that the process was not followed:</t>
          <blockquote>
            <t>Unfortunately, the chairs did not announce this decision on the list (this is something that should be corrected in the process).</t>
          </blockquote>
          <t>However:</t>
          <artwork><![CDATA[
It remains unclear what exactly "corrected in the process" entails.
]]></artwork>
          <t><eref target="https://mailarchive.ietf.org/arch/msg/tls/L2bWqpT3q8HVmACwD1Ta3NFimw0/">The chairs further say</eref> :</t>
          <blockquote>
            <t>The chairs made this decision because the mechanism in this draft fits into a well defined place in the TLS protocol and does not change the protocol itself.</t>
          </blockquote>
          <t>We believe this argument does not stand, given the single data point that has gone through the FATT process -- <xref target="RFC8773bis"/>. Both of the mentioned conditions apply equally to <xref target="RFC8773bis"/> which indeed went through FATT process. The mechanism defined in <xref target="RFC8773bis"/> "fits into a well defined place in the TLS protocol" and "did not change the protocol itself". So we request clarification of the matter in comparison to <xref target="RFC8773bis"/>.</t>
          <artwork><![CDATA[
We believe the security considerations of {{I-D.ietf-tls-mlkem}} are
insufficient. We also believe FATT review could have significantly
improved it, including but not limited to the key reuse ambiguity.
We have provided significant feedback during the two WGLCs. However,
almost none of that is actually reflected in the updated editor's
version.
]]></artwork>
        </section>
        <section anchor="key-update">
          <name>Key Update</name>
          <t>The process <xref target="TLS-FATT"/> states:</t>
          <blockquote>
            <t>The output of the FATT is posted to the working group by the FATT point person.</t>
          </blockquote>
          <t>Based on <eref target="https://mailarchive.ietf.org/arch/msg/tls/KFUD3FPcrUlJmnXSyb3s25UFbdo/">authors' email</eref>, while it is great that FATT could find some threat, in our observation, the FATT process does not seem to be followed in spirit.</t>
        </section>
      </section>
      <section anchor="contacting-fatt">
        <name>Contacting FATT</name>
        <t>The FATT process restricts the Verifier from contacting the FATT directly.
We argue that the Verifier should be allowed to contact the FATT (at least the FATT person for a specific draft) because of the following reasons:</t>
        <ul spacing="normal">
          <li>
            <t>Formal methods community is small and within this small community, those with deep knowledge of TLS are quite limited.</t>
          </li>
        </ul>
        <artwork><![CDATA[
Such a restriction would not have been there if the Verifier
were not a member of the TLS WG and analyzing the same draft
and free to contact the same FATT for advice. Being a member
of the TLS WG actually puts the Verifier at unnecessary disadvantage.
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The feedback we receive on the list is really limited.</t>
          </li>
          <li>
            <t>Communication via chairs is a source of misunderstandings, as it has already happened with the chairs summarizing the intent of "Tamarin-like" to just "Tamarin".</t>
          </li>
        </ul>
      </section>
      <section anchor="understanding-the-opposing-goals">
        <name>Understanding the Opposing Goals</name>
        <t>The authors need to understand that the task of the Verifier is to find the subtle corner cases where the protocol may fail.
This is naturally opposed to the goal of the authors -- that is, to convince the WG that the protocol is good enough to be adopted/published.</t>
        <artwork><![CDATA[
Unless the Verifier remains really focused on checking subtleties,
there is little value of formal analysis.
]]></artwork>
        <t>In particular, some topics like remote attestation need more precise specifications because small changes or ambiguites may make a big difference.</t>
      </section>
      <section anchor="no-response-from-some-authors">
        <name>No Response from Some Authors</name>
        <t>Some authors of adopted drafts do not respond for several months, despite repeated reminders <xref target="FormalAnalysisPAKE"/>.</t>
        <artwork><![CDATA[
If any authors would like us not to do the analysis, it's
absolutely fine to clearly say so.
]]></artwork>
      </section>
      <section anchor="slots-at-meeting">
        <name>Slots at Meeting</name>
        <artwork><![CDATA[
Formal analysis -- just like any other code development -- is an
iterative process and needs to be progressively discussed with
the WG (and not just authors!) to be able to propose secure
solutions.
]]></artwork>
        <t>So at least some time should be allocated in the meetings for discussion of formal analysis.</t>
        <ul spacing="normal">
          <li>
            <t>We requested a slot for 10 minutes (and 5 minutes if tight on schedule) for discussion of our questions about <xref target="I-D.ietf-tls-extended-key-update"/> at IETF 124. It seemed that the slots were spread over the meeting time to show that there is no time left for our topic. In the end, the meeting ended one hour earlier where 10 minutes from that could have been utilized for discussion on formal analysis of <xref target="I-D.ietf-tls-extended-key-update"/>. Given that the authors were informed <xref target="FormalAnalysisKeyUpdate"/> about the issues, what the authors presented was not very helpful in terms of progressing the formal analysis work and proposing some solutions. Key schedule is a subtle topic and not something we can talk effectively on the mic without a proper diagram on display. It is unclear why formal analysis is such a low priority to the chairs.</t>
          </li>
          <li>
            <t>If the authors are doing the formal analysis themselves, they should also present the current state of formal analysis for discussion. This will help the Verifier give any feedback and avoid any repititive effort.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-res-authors">
      <name>Responsibilities of Authors</name>
      <t>This document proposes that the authors provide the following four items:</t>
      <section anchor="motivation-1">
        <name>Motivation</name>
        <t>The motivation of the work (i.e., the proposed extension of TLS) needs to primarily come from the authors.
The Verifier can ask questions to improve it, but he cannot just cook it up.</t>
      </section>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>A threat model outlines the assumptions and known weaknesses of the proposed protocol. The threat model could be the classical Dolev-Yao adversary. In addition, it could specify any keys (e.g., long-term keys or session keys) which may be compromised (i.e., available to the adversary).</t>
      </section>
      <section anchor="informal-security-goals">
        <name>Informal Security Goals</name>
        <t>Knowing what you want is the first step toward achieving it. Hence, informal security goals such as integrity, authentication, freshness, etc. should be outlined in the Internet-Draft.
If the informal security goals are not spelled out in the Internet-Draft, it is safe to assume that the goals are still unclear to the authors.</t>
      </section>
      <section anchor="protocol-diagram">
        <name>Protocol Diagram</name>
        <t>A Protocol Diagram should clearly mention the initial knowledge of the protocol participants, e.g., which authentic public keys are known to the protocol participants at the start of the protocol. An example of a Protocol Diagram for <xref target="I-D.fossati-tls-attestation-08"/> is provided in Figure 5 in <xref target="ID-Crisis"/>.</t>
      </section>
    </section>
    <section anchor="document-structure">
      <name>Document Structure</name>
      <t>While the needs may differ for some drafts, we propose the following baseline template, with an example of <xref target="I-D.wang-tls-service-affinity"/>:</t>
      <t>TODO: Currently it is almost a copy of the <eref target="https://mailarchive.ietf.org/arch/msg/tls/LfIHs1OVwDKWmDuCEx0p8wP-KPs/">guidance email</eref> to the authors. We will add details in next version.</t>
      <section anchor="introduction-1">
        <name>Introduction</name>
        <ul spacing="normal">
          <li>
            <t>Problem statement: Say in general what the problem is.</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, we believe this
 should <em>not</em> include CATS. Anyone unfamiliar with CATS should be
 able to understand your problem.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>Define any terms not defined in RFC8446bis or point to other drafts from where the definition is used.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation-and-design-rationale">
        <name>Motivation and design rationale</name>
        <ul spacing="normal">
          <li>
            <t>We really like how Russ motivates the problem statement in <xref target="I-D.ietf-tls-8773bis"/>. Use it as a sample.</t>
          </li>
          <li>
            <t>Here authors should address all the concerns from WG, including
 justification with compelling arguments and authentic references
 why authors think it should be done within TLS WG (and within handshake).</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, authors could put CATS here as a motivational use case.</t>
          </li>
        </ul>
      </section>
      <section anchor="proposed-solution-one-or-more-sections">
        <name>Proposed solution (one or more sections)</name>
        <ul spacing="normal">
          <li>
            <t>Protocol design with Protocol Diagram: we work on the formal analysis of TLS 1.3 exclusively. Please contact someone else if your draft relates to older versions.</t>
          </li>
        </ul>
      </section>
      <section anchor="security-considerations">
        <name>Security considerations</name>
        <section anchor="threat-model-1">
          <name>Threat model</name>
        </section>
        <section anchor="desired-security-goals">
          <name>Desired security goals</name>
          <t>As draft proceeds these desired security goals will become what the draft actually achieves.</t>
        </section>
        <section anchor="other-security-implicationsconsiderations">
          <name>Other security implications/considerations</name>
        </section>
      </section>
    </section>
    <section anchor="sec-res-verifier">
      <name>Responsibilities of Verifier</name>
      <t>When the authors declare the version as ready for formal analysis, the Verifier takes the above inputs, performs the formal analysis, and brings the results back to the authors and the WG. Based on the analysis, the verifier may propose updates to the Security Considerations section or other sections of the Internet-Draft.</t>
    </section>
    <section anchor="security-considerations-1">
      <name>Security Considerations</name>
      <t>The whole document is about improving security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS-FATT" target="https://github.com/tlswg/tls-fatt">
          <front>
            <title>TLS FATT Process</title>
            <author>
              <organization>IETF TLS WG</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation-08">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="RFC4101">
          <front>
            <title>Writing Protocol Models</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author>
              <organization abbrev="IAB">Internet Architecture Board</organization>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>The IETF process depends on peer review. However, IETF documents are generally written to be useful for implementors, not reviewers. In particular, while great care is generally taken to provide a complete description of the state machines and bits on the wire, this level of detail tends to get in the way of initial understanding. This document describes an approach for providing protocol "models" that allow reviewers to quickly grasp the essence of a system. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4101"/>
          <seriesInfo name="DOI" value="10.17487/RFC4101"/>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-extended-key-update">
          <front>
            <title>Extended Key Update for Transport Layer Security (TLS) 1.3</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Michael Tüxen" initials="M." surname="Tüxen">
              <organization>Münster Univ. of Applied Sciences</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <date day="2" month="March" year="2026"/>
            <abstract>
              <t>   TLS 1.3 ensures forward secrecy by performing an ephemeral Diffie-
   Hellman key exchange during the initial handshake, protecting past
   communications even if a party's long-term keys (typically a private
   key with a corresponding certificate) are later compromised.  While
   the built-in KeyUpdate mechanism allows application traffic keys to
   be refreshed during a session, it does not incorporate fresh entropy
   from a new key exchange and therefore does not provide post-
   compromise security.  This limitation can pose a security risk in
   long-lived sessions, such as those found in industrial IoT or
   telecommunications environments.

   To address this, this specification defines an extended key update
   mechanism that performs a fresh Diffie-Hellman exchange within an
   active session, thereby ensuring post-compromise security.  By
   forcing attackers to exfiltrate new key material repeatedly, this
   approach mitigates the risks associated with static key compromise.
   Regular renewal of session keys helps contain the impact of such
   compromises.  The extension is applicable to both TLS 1.3 and DTLS
   1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-extended-key-update-10"/>
        </reference>
        <reference anchor="I-D.ietf-tls-8773bis">
          <front>
            <title>TLS 1.3 Extension for Using Certificates with an External Pre-Shared Key</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date day="5" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS 1.3 extension that allows TLS clients
   and servers to authenticate with certificates and provide
   confidentiality based on encryption with a symmetric key from the
   usual key agreement algorithm and an external pre-shared key (PSK).
   This Standards Track RFC (once approved) obsoletes RFC 8773, which
   was an Experimental RFC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-8773bis-13"/>
        </reference>
        <reference anchor="FormalAnalysisPAKE" target="https://mailarchive.ietf.org/arch/msg/tls/igQGFE1INA6eR_Fdz8eTp74ffVc/">
          <front>
            <title>Formal analysis of draft-ietf-tls-pake</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2026" month="January"/>
          </front>
        </reference>
        <reference anchor="FormalAnalysisKeyUpdate" target="https://mailarchive.ietf.org/arch/msg/tls/P_VdWSi20TZG0rJEaz7VCPKDIOg/">
          <front>
            <title>Comments on draft-ietf-tls-extended-key-update</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.fossati-seat-early-attestation-00">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="9" month="January" year="2026"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using remote attestation
   which is a process by which an entity produces Evidence about itself
   that another party can use to appraise whether that entity is found
   in a secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enable the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation Evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and to use them mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-seat-early-attestation-00"/>
        </reference>
        <reference anchor="RFC8773bis">
          <front>
            <title>TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document specifies a TLS 1.3 extension that allows a server to authenticate with a combination of a certificate and an external pre-shared key (PSK).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8773"/>
          <seriesInfo name="DOI" value="10.17487/RFC8773"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mlkem">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as
   NamedGroups and and registers IANA values in the TLS Supported Groups
   registry for use in TLS 1.3 to achieve post-quantum (PQ) key
   establishment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-07"/>
        </reference>
        <reference anchor="I-D.wang-tls-service-affinity">
          <front>
            <title>Service Affinity Solution based on Transport Layer Security (TLS)</title>
            <author fullname="Wei Wang" initials="W." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Mohit Sahni" initials="M." surname="Sahni">
              <organization>Palo Alto Networks</organization>
            </author>
            <author fullname="Ketul Sheth" initials="K." surname="Sheth">
              <organization>Palo Alto Networks</organization>
            </author>
            <date day="17" month="October" year="2025"/>
            <abstract>
              <t>   This draft proposes a service affinity solution between client and
   server based on Transport Layer Security (TLS).  An extension to
   Transport Layer Security (TLS) 1.3 to enable session migration.  This
   mechanism is designed for modern network architectures, particularly
   for multi-homed servers that possess multiple network interfaces and
   IP addresses.

   Comparing to the existing solutions such as maintaining the customer-
   based connection status table in network devices, HTTP redirection
   and DNS redirection, this solution can avoid the waste of resources
   caused by saving a large amount of customer status data in the
   network devices, and realize the optimized scheduling of resources
   based on network conditions and computing resources in the computing-
   aware traffic steering scenario, so as to realize the reasonable
   operation of network resources, cloud resources and computing
   resources.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wang-tls-service-affinity-00"/>
        </reference>
      </references>
    </references>
    <?line 344?>

<section numbered="false" anchor="appendix">
      <name>Appendix</name>
      <section numbered="false" anchor="document-history">
        <name>Document History</name>
        <t>-02</t>
        <ul spacing="normal">
          <li>
            <t>Added document structure</t>
          </li>
          <li>
            <t>FATT-bypass by Other TLS-related WGs</t>
          </li>
          <li>
            <t>FATT process not being followed</t>
          </li>
        </ul>
        <t>-01</t>
        <ul spacing="normal">
          <li>
            <t>Pain points of Verifier <xref target="sec-prot-diagram"/></t>
          </li>
          <li>
            <t>Small adjustment of phrasing</t>
          </li>
        </ul>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
