<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-fatt-extension-04" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title>Extensions to TLS FATT Process</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-fatt-extension-04"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="April" day="14"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 54?>

<t>This document applies only to non-trivial extensions of TLS, which require formal analysis. It proposes the authors specify a threat model and informal security goals in the Security Considerations section, as well as motivation and a protocol diagram in the draft.
We also briefly present a few pain points of the team doing the formal analysis which -- we believe -- require refining the process:</t>
      <ul spacing="normal">
        <li>
          <t>Contacting FATT</t>
        </li>
        <li>
          <t>Understanding the opposing goals</t>
        </li>
        <li>
          <t>Response within reasonable time frame</t>
        </li>
        <li>
          <t>Discussion at meeting</t>
        </li>
        <li>
          <t>Provide protection against FATT-bypass by other TLS-related WGs</t>
        </li>
        <li>
          <t>Process not being followed</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/tls-fatt-extension/draft-usama-tls-fatt-extension.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-fatt-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/tls-fatt-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 67?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While the TLS FATT process <xref target="TLS-FATT"/> marks a historic change in achieving high cryptographic assurances by tightly integrating formal methods in the working group (WG) process, the current FATT process has some practical limitations. Given a relatively smaller formal methods community, and a steep learning curve as well as very low consideration of usability in the existing formal analysis tools, this document proposes some solutions to make the FATT process sustainable.</t>
      <t>Specifically, the TLS FATT process does not outline the division of responsibility between the authors and the team doing the formal analysis (the latter is hereafter referred to as the "Verifier"). This document aims to propose some solutions without putting an extensive burden on either party.</t>
      <t>An argument is often presented by the authors that an Internet-Draft is written for the implementers. We make several counter-arguments here:</t>
      <ul spacing="normal">
        <li>
          <t>Researchers and protocol designers are also stakeholders of such specifications <xref target="I-D.irtf-cfrg-cryptography-specification"/>.</t>
        </li>
        <li>
          <t>Even implementers may like to understand the security implications before blindly starting to implement it.</t>
        </li>
        <li>
          <t>With the FATT process, this argument is clearly invalid. The Verifier may not be an implementer.</t>
        </li>
      </ul>
      <t>This document outlines the corresponding changes in the way Internet-Drafts are typically written.
For the Internet-Draft to be useful for the formal analysis, this document proposes that the draft should contain four main items, namely:</t>
      <ul spacing="normal">
        <li>
          <t>motivation,</t>
        </li>
        <li>
          <t>a threat model,</t>
        </li>
        <li>
          <t>informal security goals, and</t>
        </li>
        <li>
          <t>a protocol diagram (<xref target="sec-prot-diagram"/>).</t>
        </li>
      </ul>
      <t>Each one of these is summarized in <xref target="sec-res-authors"/>. Future versions of this draft will include concrete examples.</t>
      <t>Responsibilities of the Verifier are summarized in <xref target="sec-res-verifier"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>A clear separation of responsibilities would help IRTF UFMRG to train the authors and verifiers separately to fulfill their own responsibilities.</t>
        <t>Moreover, we believe that the experiences can help improve the FATT process. The goal is to document the identified gaps with concrete examples, discuss those and mutually find the best way forward.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is only non-trivial extensions of TLS, which require formal analysis.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="sec-prot-diagram">
        <name>Protocol Diagram</name>
        <t>In the context of this document, a Protocol Diagram specifies the proposed cryptographically-relevant changes compared to the standard TLS protocol <xref target="I-D.ietf-tls-rfc8446bis"/>. This is conceptually similar to the Protocol Model in <xref target="RFC4101"/>. However, while <xref target="RFC4101"/> only recommends diagrams, we consider diagrams to be essential.</t>
      </section>
      <section anchor="verifier">
        <name>Verifier</name>
        <t>In this document, the Verifier refers to the team doing the formal analysis.
Note that it is NOT a new formal role in the WG process.</t>
      </section>
      <section anchor="definition-of-attack">
        <name>Definition of Attack</name>
        <t>Any ambiguity originating from the threat model, informal security goals, and a Protocol Diagram is to be considered as an attack.
The authors are, therefore, encouraged to be as precise as possible.
The Verifier may propose text for consideration by authors/WG to disambiguate or propose a fix to the attack.</t>
      </section>
    </section>
    <section anchor="sec-pain-points">
      <name>Pain Points of Verifier</name>
      <t>From the two extremes -- <xref target="I-D.ietf-tls-8773bis"/> where Russ kindly provided all requested inputs and we were able to get it through (with a <eref target="https://mailarchive.ietf.org/arch/msg/tls/6Wk82oBGd61rTK23DgfYb7BmRKM/">small change</eref>) without any formal analysis to <xref target="I-D.fossati-tls-attestation-08"/> where formal analysis revealed vulnerabilities <xref target="ID-Crisis"/> and resulted in a separate WG to tackle this problem -- we summarize the pain points of the Verifier with the hope that we can refine the process.</t>
      <t>Note that we are not at all asserting that the authors have no pain points. They very likely have their own -- that is another indication that the process needs a refinement.</t>
      <section anchor="provide-protection-against-fatt-bypass-by-other-tls-related-wgs">
        <name>Provide Protection Against FATT-bypass by Other TLS-related WGs</name>
        <t>TLS-related WGs in particular those where the representation of TLS WG is a minority -- including the one (SEAT WG) that the author has defended himself as one of the six proponents -- <bcp14>MUST NOT</bcp14> be allowed to make changes to the TLS protocol beyond what is explicitly allowed in their charter.</t>
        <t>If rechartering of such WGs is <em>absolutely unavoidable</em> and includes non-trivial changes to the TLS protocol, it <bcp14>MUST</bcp14> only be done after agreement with the TLS WG. This will prevent the short-circuit path for FATT. If the WG does not have proper FATT-like process, TLS WG may request FATT review before WGLC.</t>
        <t>In short, our concern is:</t>
        <artwork><![CDATA[
What's the point of such a TLS FATT process when other WGs
can simply bypass this process to make key schedule level changes?
]]></artwork>
        <t>For example, <xref target="I-D.fossati-seat-early-attestation-00"/> makes key schedule level changes, breaks the SEAT WG charter and SEAT WG has no formal FATT-like process.</t>
      </section>
      <section anchor="process-not-being-followed">
        <name>Process not being followed</name>
        <t>The process <xref target="TLS-FATT"/> states:</t>
        <blockquote>
          <t>When a document is adopted by the working group the chairs will make a determination whether the change proposed by the document requires review by the FATT to determine if formal protocol analysis is necessary for the change. For example a proposal that modifies the TLS key schedule or the authentication process or any other part of the cryptographic protocol that has been formally modeled and analyzed in the past would likely result in asking the FATT, whereas a change such as modifying the SSLKEYLOG format would not. The working group chairs will inform the working group of this decision.</t>
        </blockquote>
        <t>However, such information has not been provided to the WG for at least the following 2 documents:</t>
        <section anchor="sec-ml-kem">
          <name>ML-KEM</name>
          <t>For the draft <xref target="I-D.ietf-tls-mlkem"/>, the <eref target="https://mailarchive.ietf.org/arch/msg/tls/L2bWqpT3q8HVmACwD1Ta3NFimw0/">chairs acknowledge</eref> that the process was not followed:</t>
          <blockquote>
            <t>Unfortunately, the chairs did not announce this decision on the list (this is something that should be corrected in the process).</t>
          </blockquote>
          <t>However:</t>
          <artwork><![CDATA[
It remains unclear what exactly "corrected in the process" entails.
]]></artwork>
          <t><eref target="https://mailarchive.ietf.org/arch/msg/tls/L2bWqpT3q8HVmACwD1Ta3NFimw0/">The chairs further say</eref> :</t>
          <blockquote>
            <t>The chairs made this decision because the mechanism in this draft fits into a well defined place in the TLS protocol and does not change the protocol itself.</t>
          </blockquote>
          <t>We believe this argument does not stand, given the single data point that has gone through the FATT process -- <xref target="RFC8773bis"/>. Both of the mentioned conditions apply equally to <xref target="RFC8773bis"/> which indeed went through FATT process. The mechanism defined in <xref target="RFC8773bis"/> "fits into a well defined place in the TLS protocol" and "did not change the protocol itself". So we request clarification of the matter in comparison to <xref target="RFC8773bis"/>.</t>
          <artwork><![CDATA[
We believe the security considerations of {{I-D.ietf-tls-mlkem}} are
insufficient. We also believe FATT review could have significantly
improved it, including but not limited to the key reuse ambiguity.
We have provided significant feedback during the two WGLCs. However,
almost none of that is actually reflected in the updated editor's
version.
]]></artwork>
          <section anchor="formal-analysis">
            <name>Formal analysis</name>
            <t>We have presented observation from our ongoing formal analysis (cf. limitations in <xref target="sec-sec-cons"/>) on the mailing list in <eref target="https://mailarchive.ietf.org/arch/msg/tls/g4lCSltMQQY8xHdJdtjTvudTMes/">this email</eref>.</t>
          </section>
          <section anchor="cost">
            <name>"Cost"</name>
            <t>"Cost" has been presented on the list as the motivation for ML-KEM but no authentic reference has yet been presented. There seems to be a need for a thorough study to understand the "cost."</t>
          </section>
        </section>
        <section anchor="key-update">
          <name>Key Update</name>
          <t>The process <xref target="TLS-FATT"/> states:</t>
          <blockquote>
            <t>The output of the FATT is posted to the working group by the FATT point person.</t>
          </blockquote>
          <t>Based on <eref target="https://mailarchive.ietf.org/arch/msg/tls/KFUD3FPcrUlJmnXSyb3s25UFbdo/">authors' email</eref>, while it is great that FATT could find some threat, in our observation, the FATT process does not seem to be followed in spirit.</t>
        </section>
      </section>
      <section anchor="contacting-fatt">
        <name>Contacting FATT</name>
        <t>The FATT process restricts the Verifier from contacting the FATT directly.
We argue that the Verifier should be allowed to contact the FATT (at least the FATT person for a specific draft) because of the following reasons:</t>
        <ul spacing="normal">
          <li>
            <t>Formal methods community is small and within this small community, those with deep knowledge of TLS are quite limited.</t>
          </li>
        </ul>
        <artwork><![CDATA[
Such a restriction would not have been there if the Verifier
were not a member of the TLS WG and analyzing the same draft
and free to contact the same FATT for advice. Being a member
of the TLS WG actually puts the Verifier at unnecessary disadvantage.
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The feedback we receive on the list is really limited.</t>
          </li>
          <li>
            <t>Communication via chairs is a source of misunderstandings, as it has already happened with the chairs summarizing the intent of "Tamarin-like" to just "Tamarin".</t>
          </li>
        </ul>
      </section>
      <section anchor="understanding-the-opposing-goals">
        <name>Understanding the Opposing Goals</name>
        <t>The authors need to understand that the task of the Verifier is to find the subtle corner cases where the protocol may fail.
This is naturally opposed to the goal of the authors -- that is, to convince the WG that the protocol is good enough to be adopted/published.</t>
        <artwork><![CDATA[
Unless the Verifier remains really focused on checking subtleties,
there is little value of formal analysis.
]]></artwork>
        <t>In particular, some topics like remote attestation need more precise specifications because small changes or ambiguites may make a big difference.</t>
      </section>
      <section anchor="response-within-reasonable-time-frame">
        <name>Response within reasonable time frame</name>
        <t>If authors do not respond to the Verifier's questions within a reasonable time frame (say a few weeks but not months), the Verifier may not pursue formal analysis of their draft.</t>
      </section>
      <section anchor="sec-discuss-meetings">
        <name>Discussion at Meeting</name>
        <artwork><![CDATA[
Formal analysis -- just like any other code development -- is an
iterative process and needs to be progressively discussed with
the WG (and not just authors!) to be able to propose secure
solutions.
]]></artwork>
        <t>So at least some time should be allocated in the meetings for discussion of formal analysis.</t>
        <t>If the authors are doing the formal analysis themselves, it would be helpful to also present the current state of formal analysis in meetings for discussion. This may be a single slide describing:</t>
        <ul spacing="normal">
          <li>
            <t>Approach used: symbolic or computational</t>
          </li>
          <li>
            <t>Tool used: ProVerif, CryptoVerif etc.</t>
          </li>
          <li>
            <t>Properties established</t>
          </li>
        </ul>
        <t>This will help the Verifier give any feedback and avoid any repititive effort.</t>
      </section>
    </section>
    <section anchor="proposed-solutions">
      <name>Proposed solutions</name>
      <t>In addition to those mentioned inline in the previous section, we propose the following:</t>
      <section anchor="transparency">
        <name>Transparency</name>
        <ul spacing="normal">
          <li>
            <t>The process should be as transparent to the WG as possible. For example, see <eref target="https://github.com/tlswg/tls-fatt/pull/16">PR#16</eref>.</t>
          </li>
        </ul>
      </section>
      <section anchor="wg-consultation-and-information-in-decisions">
        <name>WG consultation and information in decisions</name>
        <ul spacing="normal">
          <li>
            <t>It should be the <strong>WG</strong> (and not the chairs) that deems whether some FATT analysis is
   required. At the very least, WG should be given the right to argue against the decision of the
    chairs regarding whether FATT analysis is required. We believe the opinions of relevant stakeholders -- those who are doing the
    formal analysis of the drafts of the WG, OR actively contributing to it, OR have done formal analysis
   in the past, OR have reasonably good knowledge of it, OR have relevant expertise -- should be heard.</t>
          </li>
        </ul>
      </section>
      <section anchor="controversial-drafts-need-fatt-review">
        <name>Controversial drafts need FATT review</name>
        <ul spacing="normal">
          <li>
            <t>Surely not every draft needs to go to FATT but we believe the controversial
    ones do need to go to FATT, regardless of the nature of the draft
    and whatever the chairs believe. As a reminder, 'nothing required'
    is a perfectly valid outcome of initial FATT review. Formal methods
    may help resolve some of the controversies.</t>
          </li>
        </ul>
      </section>
      <section anchor="scope-of-fatt">
        <name>Scope of FATT</name>
        <ul spacing="normal">
          <li>
            <t>Be more explicit on:
            </t>
            <ul spacing="normal">
              <li>
                <t>what is the scope of FATT?</t>
              </li>
              <li>
                <t>what kind of drafts need FATT review and why?</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-res-authors">
      <name>Responsibilities of Authors</name>
      <t>This document proposes that the authors provide the following four items:</t>
      <section anchor="motivation-1">
        <name>Motivation</name>
        <t>The motivation of the work (i.e., the proposed extension of TLS) needs to primarily come from the authors.
The Verifier can ask questions to improve it, but he cannot just cook it up.</t>
      </section>
      <section anchor="sec-th-model">
        <name>Threat Model</name>
        <t>A threat model identifies which threats are in scope for the protocol design. So it should answer questions like:</t>
        <ul spacing="normal">
          <li>
            <t>What are the capabilities of the adversary? What can the adversary do?</t>
          </li>
          <li>
            <t>Whether post-quantum threats are in scope?</t>
          </li>
          <li>
            <t>What can go wrong in the system? etc.</t>
          </li>
        </ul>
        <section anchor="typical-dolev-yao-adversary">
          <name>Typical Dolev-Yao adversary</name>
          <t>A typical threat model assumes the classical Dolev-Yao adversary, who has full control over the communication channel.</t>
          <t>Any additional adversary capabilities and assumptions must be explicitly stated.</t>
        </section>
        <section anchor="potential-weaknesses-of-cryptographic-primitives">
          <name>Potential Weaknesses of Cryptographic Primitives</name>
          <t>In general, it also outlines the potential weaknesses of the cryptographic primitives used in the proposed protocol extension. Examples include:</t>
          <ul spacing="normal">
            <li>
              <t>weak hash functions</t>
            </li>
            <li>
              <t>weak Diffie-Hellman (DH) groups</t>
            </li>
            <li>
              <t>weak elements within strong DH groups</t>
            </li>
          </ul>
        </section>
        <section anchor="keys">
          <name>Keys</name>
          <t>This section should specify any keys in the system (e.g., long-term keys of the server) in addition to the standard TLS key schedule. Theoretically and arguably practically, any key may be compromised (i.e., become available to the adversary).</t>
          <t>For readability, we propose defining each key clearly as in Section 4.1 of <xref target="ID-Crisis"/>. Alternatively, present as a table with the following entries for each key:</t>
          <ul spacing="normal">
            <li>
              <t>Name (or symbol) of the key</t>
            </li>
            <li>
              <t>Purpose of the key</t>
            </li>
            <li>
              <t>(optionally but preferably -- particularly when the endpoint is not fully trusted) Which software in the system has access to the key?</t>
            </li>
          </ul>
          <t>If more than one servers are involved (such as migration cases), the keys for servers should be distinguished in an unambiguous way.</t>
        </section>
      </section>
      <section anchor="informal-security-goals">
        <name>Informal Security Goals</name>
        <t>Knowing what you want is the first step toward achieving it. Hence, informal security goals such as integrity, authentication, freshness, etc. should be outlined in the Internet-Draft.
If the informal security goals are not spelled out in the Internet-Draft, it is safe to assume that the goals are still unclear to the authors.</t>
        <t>Examples:</t>
        <ul spacing="normal">
          <li>
            <t>Integrity of message X holds unless some key Y is leaked.</t>
          </li>
          <li>
            <t>Freshness of message X holds unless some key Y or some key Z is leaked.</t>
          </li>
          <li>
            <t>Server Authentication holds unless some key Y or some key Z is leaked.</t>
          </li>
        </ul>
        <t>See Section 5.1 of <xref target="ID-Crisis"/> for concrete examples.</t>
      </section>
      <section anchor="protocol-diagram">
        <name>Protocol Diagram</name>
        <t>A Protocol Diagram should clearly mention the initial knowledge of the protocol participants, e.g., which authentic public keys are known to the protocol participants at the start of the protocol. An example of a Protocol Diagram for <xref target="I-D.fossati-tls-attestation-08"/> is provided in Figure 5 in <xref target="ID-Crisis"/>.</t>
      </section>
    </section>
    <section anchor="document-structure">
      <name>Document Structure</name>
      <t>While the needs may differ for some drafts, we propose the following baseline template, with an example of <xref target="I-D.wang-tls-service-affinity"/>:</t>
      <t>The template is:</t>
      <ul spacing="normal">
        <li>
          <t>Easy for readers</t>
        </li>
        <li>
          <t>Easy for reviewers</t>
        </li>
        <li>
          <t>Easy for formal analysis</t>
        </li>
      </ul>
      <t>TODO: Currently it is almost a copy of the <eref target="https://mailarchive.ietf.org/arch/msg/tls/LfIHs1OVwDKWmDuCEx0p8wP-KPs/">guidance email</eref> to the authors. We will add details in next versions.</t>
      <section anchor="introduction-1">
        <name>Introduction</name>
        <ul spacing="normal">
          <li>
            <t>Problem statement: Say in general what the problem is.</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, we believe this
 should <em>not</em> include CATS. Anyone unfamiliar with CATS should be
 able to understand your problem.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>Define any terms not defined in RFC8446bis or point to other drafts from where the definition is used.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation-and-design-rationale">
        <name>Motivation and design rationale</name>
        <ul spacing="normal">
          <li>
            <t>We really like how Russ motivates the problem statement in <xref target="I-D.ietf-tls-8773bis"/>. Use it as a sample.</t>
          </li>
          <li>
            <t>Here authors should address all the concerns from WG, including
 justification with compelling arguments and authentic references
 why authors think it should be done within TLS WG (and within handshake).</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, authors could put CATS here as a motivational use case.</t>
          </li>
        </ul>
      </section>
      <section anchor="proposed-solution-one-or-more-sections">
        <name>Proposed solution (one or more sections)</name>
        <ul spacing="normal">
          <li>
            <t>Protocol design with Protocol Diagram: we work on the formal analysis of TLS 1.3 exclusively. Please contact someone else if your draft relates to older versions.</t>
          </li>
        </ul>
      </section>
      <section anchor="security-considerations">
        <name>Security considerations</name>
        <section anchor="threat-model">
          <name>Threat model</name>
        </section>
        <section anchor="desired-security-goals">
          <name>Desired security goals</name>
          <t>As draft proceeds these desired security goals will become what the draft actually achieves.</t>
        </section>
        <section anchor="other-security-implicationsconsiderations">
          <name>Other security implications/considerations</name>
        </section>
      </section>
    </section>
    <section anchor="sec-res-verifier">
      <name>Responsibilities of Verifier</name>
      <t>When the authors declare the version as ready for formal analysis, the Verifier takes the above inputs, performs the formal analysis, and brings the results back to the authors and the WG. Based on the analysis, the verifier may propose updates to the Security Considerations section or other sections of the Internet-Draft.</t>
    </section>
    <section anchor="sec-sec-cons">
      <name>Security Considerations</name>
      <t>The whole document is about improving security considerations.</t>
      <t>Like all security proofs, formal analysis is only as strong as its assumptions and model. The scope is typically limited, and the model does not necessarily capture real-world deployment complexity, implementation details, operational constraints, or misuse scenarios. Formal methods should be used as complementary and not as subtitute of other analysis methods.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS-FATT" target="https://github.com/tlswg/tls-fatt">
          <front>
            <title>TLS FATT Process</title>
            <author>
              <organization>IETF TLS WG</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation-08">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="RFC4101">
          <front>
            <title>Writing Protocol Models</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author>
              <organization abbrev="IAB">Internet Architecture Board</organization>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>The IETF process depends on peer review. However, IETF documents are generally written to be useful for implementors, not reviewers. In particular, while great care is generally taken to provide a complete description of the state machines and bits on the wire, this level of detail tends to get in the way of initial understanding. This document describes an approach for providing protocol "models" that allow reviewers to quickly grasp the essence of a system. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4101"/>
          <seriesInfo name="DOI" value="10.17487/RFC4101"/>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-8773bis">
          <front>
            <title>TLS 1.3 Extension for Using Certificates with an External Pre-Shared Key</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date day="5" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS 1.3 extension that allows TLS clients
   and servers to authenticate with certificates and provide
   confidentiality based on encryption with a symmetric key from the
   usual key agreement algorithm and an external pre-shared key (PSK).
   This Standards Track RFC (once approved) obsoletes RFC 8773, which
   was an Experimental RFC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-8773bis-13"/>
        </reference>
        <reference anchor="I-D.fossati-seat-early-attestation-00">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="9" month="January" year="2026"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using remote attestation
   which is a process by which an entity produces Evidence about itself
   that another party can use to appraise whether that entity is found
   in a secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enable the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation Evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and to use them mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-seat-early-attestation-00"/>
        </reference>
        <reference anchor="RFC8773bis">
          <front>
            <title>TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document specifies a TLS 1.3 extension that allows a server to authenticate with a combination of a certificate and an external pre-shared key (PSK).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8773"/>
          <seriesInfo name="DOI" value="10.17487/RFC8773"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mlkem">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as
   NamedGroups and and registers IANA values in the TLS Supported Groups
   registry for use in TLS 1.3 to achieve post-quantum (PQ) key
   establishment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-07"/>
        </reference>
        <reference anchor="I-D.wang-tls-service-affinity">
          <front>
            <title>Service Affinity Solution based on Transport Layer Security (TLS)</title>
            <author fullname="Wei Wang" initials="W." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Mohit Sahni" initials="M." surname="Sahni">
              <organization>Palo Alto Networks</organization>
            </author>
            <author fullname="Ketul Sheth" initials="K." surname="Sheth">
              <organization>Palo Alto Networks</organization>
            </author>
            <date day="8" month="April" year="2026"/>
            <abstract>
              <t>   This draft proposes a service affinity solution between client and
   server based on Transport Layer Security (TLS).  An extension to
   Transport Layer Security (TLS) 1.3 to enable session migration.  This
   mechanism is designed for network architectures, particularly for
   multi-homed servers that possess multiple network interfaces and IP
   addresses.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wang-tls-service-affinity-01"/>
        </reference>
      </references>
    </references>
    <?line 411?>

<section numbered="false" anchor="appendix">
      <name>Appendix</name>
      <section numbered="false" anchor="document-history">
        <name>Document History</name>
        <t>-04</t>
        <ul spacing="normal">
          <li>
            <t>Extended threat model <xref target="sec-th-model"/></t>
          </li>
          <li>
            <t>Helpful discussions on formal analysis in meetings in <xref target="sec-discuss-meetings"/></t>
          </li>
          <li>
            <t>Pointer to formal analysis and costs in <xref target="sec-ml-kem"/></t>
          </li>
        </ul>
        <t>-03</t>
        <ul spacing="normal">
          <li>
            <t>Limitations of formal analysis in security considerations</t>
          </li>
          <li>
            <t>Proposed solutions section</t>
          </li>
          <li>
            <t>More guidance for authors: Threat Model and Informal Security Goals</t>
          </li>
        </ul>
        <t>-02</t>
        <ul spacing="normal">
          <li>
            <t>Added document structure</t>
          </li>
          <li>
            <t>FATT-bypass by Other TLS-related WGs</t>
          </li>
          <li>
            <t>FATT process not being followed</t>
          </li>
        </ul>
        <t>-01</t>
        <ul spacing="normal">
          <li>
            <t>Pain points of Verifier <xref target="sec-prot-diagram"/></t>
          </li>
          <li>
            <t>Small adjustment of phrasing</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thankfully acknowledge Eric Rescorla and John Mattsson for their valuable input.</t>
      <t>The research work is funded by Deutsche Forschungsgemeinschaft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
