<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.36 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mihalcea-seat-use-cases-02" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title abbrev="SEAT Use Cases">Properties and Use Cases for Integrating Remote Attestation with Secure Channel Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-mihalcea-seat-use-cases-02"/>
    <author fullname="Ionuț Mihalcea">
      <organization>Arm</organization>
      <address>
        <email>ionut.mihalcea@arm.com</email>
      </address>
    </author>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <author fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Yuning Jiang">
      <organization/>
      <address>
        <email>jiangyuning2@h-partners.com</email>
      </address>
    </author>
    <author fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="May" day="04"/>
    <area>Security</area>
    <workgroup>SEAT Working Group</workgroup>
    <keyword>remote attestation</keyword>
    <keyword>TLS</keyword>
    <keyword>confidential computing</keyword>
    <keyword>IoT</keyword>
    <keyword>RATS</keyword>
    <abstract>
      <?line 82?>

<t>This document outlines desirable properties and use cases for integrating remote
attestation (RA) capabilities with secure channel establishment protocols (e.g., TLS and DTLS).
Peer authentication in such protocols establishes trust in a peer's network identifiers but
provides no assurance regarding the integrity of its underlying software and
hardware stack. Remote attestation addresses this gap by enabling a peer to
provide verifiable evidence about the current state of the Target Environment. This document specifies a set of essential
properties the protocol solution must have, including cryptographic binding to
the secure connection, evidence freshness, and flexibility to support different
attestation models. It then explores relevant use cases, such as confidential
data collaboration and secure secrets provisioning, to motivate the
need for this integration.  This document is intended
to serve as an input to the design
of protocol solutions within the SEAT working group.</t>
    </abstract>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="establishing-trust-in-secure-communications">
        <name>Establishing Trust in Secure Communications</name>
        <t>Secure channel protocols, such as Transport Layer Security (TLS),
primarily establish trust in a peer's identity. This is typically achieved
through mechanisms like a Public Key Infrastructure (PKI), where a trusted
Certification Authority (CA) vouches for the binding between a public key and an
identifier (e.g., a hostname).</t>
        <t>However, this model has one key limitation: entity authentication provides no assurance about the peer's state, such as the integrity of its software stack at boot time and during runtime.
A compromised endpoint, for instance, can still present a valid X.509
certificate and be considered "trusted" by a client. This gap allows compromised
endpoints to maintain network access and the trust of their peers, posing a
significant security risk in many environments.</t>
      </section>
      <section anchor="the-role-of-remote-attestation">
        <name>The Role of Remote Attestation</name>
        <t>Remote Attestation (RA), as described in the RATS architecture <xref target="RFC9334"/>, is a
mechanism designed to fill this gap. RA allows an entity (the "Attester") to
produce verifiable "Evidence" about its current runtime state. This Evidence covers the Attester's TCB and can thus include measurements of:</t>
        <ul spacing="normal">
          <li>
            <t>firmware</t>
          </li>
          <li>
            <t>operating system</t>
          </li>
          <li>
            <t>application code</t>
          </li>
          <li>
            <t>the configuration of its hardware and software security features (e.g., secure boot status and memory
isolation).</t>
          </li>
        </ul>
        <t>A "Relying Party" can then use this Evidence, often with the help of
a trusted "Verifier", to appraise the Attester's trustworthiness.</t>
        <t>Composing RA with a secure channel establishment protocol adds a second
dimension of trust - trustworthiness - to complement peer
authentication. This allows a peer to make authorization decisions based not
just on who the other party is, but also on what it is (e.g., an AMD
SEV-SNP-based server running in some known datacenter) and whether its state is
acceptable.</t>
      </section>
      <section anchor="purpose-and-scope">
        <name>Purpose and Scope</name>
        <t>The purpose of this document is to establish a set of essential properties
for composition of RA with secure channel protocols and to outline the key use
cases that can benefit from such a composition. Most of the use cases presented in this document are provided by industry contributors in the SEAT WG, who have plans to deploy this technology. The initial focus is on
TLS 1.3  <xref target="I-D.ietf-tls-rfc8446bis"/>
and its datagram-oriented variant, DTLS 1.3 <xref target="I-D.ietf-tls-rfc9147bis"/>.</t>
        <t>This document is intended as an input to the design of protocol solutions within
the SEAT working group. It defines the "why" (the motivation) and the "what" (the requirements),
but not the "how" (the protocol design itself). The "how" part is discussed
in the companion document <xref target="I-D.usama-seat-intra-vs-post"/>, which serves as the
glue between this document and the protocol specifications. A key goal of this
document is to define
requirements for a solution that is agnostic to any specific attestation
technology (e.g., Trusted Platform Modules (TPMs), Intel TDX, AMD SEV, Arm CCA).</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the terminology defined in the RATS Architecture <xref target="RFC9334"/>,
including "Attester", "Relying Party", "Verifier", "Evidence", and "Attestation
Results".</t>
      <t>This document also uses the following terms:</t>
      <ul spacing="normal">
        <li>
          <t>Trusted Computing Base (TCB) of a device: see <xref target="RFC4949"/>. Note that for this
draft, it includes respective configurations of hardware, firmware, and software.</t>
        </li>
        <li>
          <t>Confidential Workload: as defined in <xref target="I-D.draft-ccc-wimse-twi-extensions"/>.</t>
        </li>
        <li>
          <t>Measurements: as defined in <xref target="I-D.draft-ietf-rats-eat-measured-component"/>.</t>
        </li>
        <li>
          <t>AI agent: An AI agent is a software principal (typically long-running) that performs
closed-loop "perceive -&gt; plan -&gt; act" cycles using an LLM or other model,
and invokes external tools/APIs that may read sensitive data or change
system/network state. Its configuration (e.g., model choice, tool enablement,
prompt template) can change independently of the binary/image and usually
more frequently than typical platform TCB updates <xref target="AI-agents"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="integration-properties">
      <name>Integration Properties</name>
      <t>This section provides a list of desirable properties for designs that compose
RA with secure channel protocols. Proposed protocol specifications should
clearly state which of these properties are fulfilled and explain how.</t>
      <section anchor="cryptographic-binding-to-communication-channel">
        <name>Cryptographic Binding to Communication Channel</name>
        <t>The Evidence or Attestation Result is cryptographically bound to the
specific secure connection (e.g., the (D)TLS connection). This prevents
<strong>relay</strong> attacks where an attacker presents valid, but unrelated
Evidence from a different connection or context. This binding is paramount for all
use cases because the absence of this binding can be exploited in high-severity
vulnerabilities, such as <xref target="CVE-2026-33697"/>.</t>
      </section>
      <section anchor="compound-authentication">
        <name>Compound Authentication</name>
        <t>RA should complement endpoint authentication rather than replace it.
Combining the two security measures would ensure that the introduction of attestation increases security instead of replacing one security measure by another.
A formal representation of this requirement in the form of <em>composition</em> goal can be found in <xref target="ID-Crisis"/> for TLS 1.3 protocol.</t>
      </section>
      <section anchor="cryptographic-binding-to-machine-identifier">
        <name>Cryptographic Binding to Machine Identifier</name>
        <t>Evidence should be cryptographically bound to the identifier provided to the machine by the infrastructure provider to prevent <strong>diversion</strong> attacks <xref target="ID-Crisis"/>.</t>
      </section>
      <section anchor="attestation-credential-freshness">
        <name>Attestation Credential Freshness</name>
        <t>The Relying Party is able to verify that the Evidence or Attestation Result it
receives was freshly generated by the Attester for the specific RA interaction.
State is
transient, and credentials from a previous RA interaction may no longer be valid.
See
<xref section="10" sectionFormat="of" target="RFC9334"/> for more details about freshness in the context of
RA. This is formalized for attestation nonce in  <xref target="ID-Crisis"/>.</t>
      </section>
      <section anchor="negotiation-and-capability-discovery">
        <name>Negotiation and Capability Discovery</name>
        <t>Peers have a secure mechanism to discover each other's support for RA, the
specific attestation formats they can produce or consume, and the attestation
models they support. This enables interoperability and allows for graceful
fallback for endpoints that do not support RA.</t>
      </section>
      <section anchor="attestation-model-flexibility">
        <name>Attestation Model Flexibility</name>
        <t>The solution supports both the Background Check and Passport models as defined
in the RATS architecture <xref target="RFC9334"/>. The Background Check model is essential
for use cases requiring maximum freshness, while the Passport model is better
suited for performance, scalability, and scenarios where the Verifier may be
offline or unreachable by the Relying Party.</t>
      </section>
      <section anchor="interaction-with-peer-authentication">
        <name>Interaction with Peer Authentication</name>
        <t>The solution supports using RA in conjunction with traditional PKI-based
authentication (e.g., X.509 certificates). This provides two independent pillars
of trust: endpoint trustworthiness (from RA) and identity (from PKI).</t>
      </section>
      <section anchor="runtime-attestation">
        <name>Runtime Attestation</name>
        <t>Evidence collected at certificate issuance or during the initial secure channel establishment reflects only the Target Environment’s state at that moment. It cannot guarantee that the Target Environment remains trustworthy for the lifetime of the certificate or even for the duration of the secure connection (e.g., the (D)TLS connection). As a result, such static Evidence is insufficient in environments where the Target Environment may change state after the connection is established and the connection is long-lived.</t>
        <section anchor="periodic-vs-on-demand-attestation">
          <name>Periodic vs. On-demand Attestation</name>
          <t>It should be possible for the Relying Party to request new Evidence periodically or on-demand during the lifetime of the connection.
This may be necessary if the Target Environment has attributes that can change during the connection, thereby affecting its trustworthiness. Such changes cannot be detected using Evidence collected earlier.
For example, the Evidence may include dynamic parameters such as runtime configuration flags (e.g., FIPS mode), which indicate whether the device has entered or exited an approved mode, or measurements of critical system files.</t>
        </section>
      </section>
      <section anchor="privacy-preservation">
        <name>Privacy Preservation</name>
        <t>The solution must not degrade the privacy of a standard secure connection (e.g., the (D)TLS connection). Evidence
can contain highly specific, unique information about a device's hardware and
software, which could be used as an advanced tracking mechanism, following a
user across different connections and services. The design must consider how to
minimize this leakage, especially when a third-party Verifier is involved in the
protocol exchange.</t>
      </section>
      <section anchor="performance-and-efficiency">
        <name>Performance and Efficiency</name>
        <t>The introduction of remote attestation should not add prohibitive latency or overhead
to the connection establishment process. To be widely adopted, the solution must
be practical. While some overhead is unavoidable, multiple additional
round-trips or very large payloads in the initial handshake should be minimized.</t>
      </section>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>This section provides the concrete motivation for the WG's work by describing
specific use cases. For each case, the scenario, actors, and specific security
guarantees needed from RA are described.</t>
      <section anchor="secure-provisioning-and-high-assurance-operations">
        <name>Secure Provisioning and High-Assurance Operations</name>
        <t>Goal: Ensure the integrity of workloads and devices when bootstrapping their
PKI-based identity or receiving critical commands.</t>
        <section anchor="runtime-secret-provisioning">
          <name>Runtime Secret Provisioning</name>
          <t>A confidential workload starts in a
generic state and needs to fetch secrets (e.g., API keys, database credentials,
encryption keys) to become operational.</t>
          <ul spacing="normal">
            <li>
              <t>Requirement: The workload must attest its runtime state (TEE genuineness,
software measurements) to a secrets management service. The service will only
release the secrets after successful verification, ensuring they are delivered
exclusively to a trustworthy environment. This use-case also covers secure
device onboarding for IoT devices that lack a pre-provisioned PKI-based identity.</t>
            </li>
          </ul>
        </section>
        <section anchor="high-assurance-command-execution">
          <name>High-Assurance Command Execution</name>
          <t>An operator sends a critical command
to a remote system (e.g., an industrial controller, a financial transaction
processor).</t>
          <ul spacing="normal">
            <li>
              <t>Requirement: The system must provide fresh Evidence to the
operator to prove its integrity before the command is dispatched. This
prevents commands from being executed on a compromised system.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="confidential-data-collaboration">
        <name>Confidential Data Collaboration</name>
        <t>Goal: Enable multiple parties to collaborate on sensitive, combined datasets
without exposing raw data to each other or to the infrastructure operator.</t>
        <section anchor="data-clean-rooms">
          <name>Data Clean Rooms</name>
          <t>Multiple <em>data providers</em> contribute sensitive data to
a confidential workload for joint analysis. <em>Data consumers</em> receive aggregated
insights without ever accessing the raw, combined dataset.</t>
          <ul spacing="normal">
            <li>
              <t>Requirement: Before sending data, each data provider must attest the
confidential workload to verify it is running the authorized analysis code in
a secure Trusted Execution Environment (TEE). Similarly, data consumers must
attest the workload to trust the integrity of the results.</t>
            </li>
          </ul>
        </section>
        <section anchor="secure-multi-party-computation-mpc">
          <name>Secure Multi-Party Computation (MPC)</name>
          <t>Distributed parties
collaboratively compute a function (e.g., train a machine learning model)
without sharing their local data.</t>
          <ul spacing="normal">
            <li>
              <t>Requirement: The central aggregator, as well as each participating client,
must be able to mutually attest to ensure all parties are running the correct,
untampered MPC algorithm in a trusted environment.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="network-infrastructure-integrity">
        <name>Network Infrastructure Integrity</name>
        <t>Goal: Verify the integrity of network devices that form the foundation of
communication.</t>
        <section anchor="attestation-of-network-functions">
          <name>Attestation of Network Functions</name>
          <t>A router, switch, or firewall joins
a network's management plane. A Virtualized Network Function (VNF) is
instantiated on a generic server.</t>
          <ul spacing="normal">
            <li>
              <t>Requirement: The network orchestrator must verify the device's integrity
(e.g., secure boot enabled, running signed OS and firmware) before allowing it
to join the network and receive policy. This prevents a compromised router
from misdirecting traffic or a malicious VNF from inspecting sensitive
packets.</t>
            </li>
          </ul>
        </section>
        <section anchor="securing-control-and-management-planes">
          <name>Securing Control and Management Planes</name>
          <t>An administrator connects to a
network device's management interface.</t>
          <ul spacing="normal">
            <li>
              <t>Requirement: The administrator's client must verify the integrity of the
management endpoint on the network device to ensure they are not connecting to
a compromised interface that could steal credentials or manipulate the device.</t>
            </li>
          </ul>
        </section>
      </section>
      <section anchor="sec-operation-triggered">
        <name>Operation-Triggered Attestation for High-Impact Application Operations</name>
        <t>Goal: Ensure the integrity of application services at operation time,
when security posture may change after initial channel establishment.</t>
        <t>Use case: <strong>High-Assurance Operation Execution in Dynamic Application Services</strong>:
An application service instance (e.g., AI agent) or confidential computing
environment (which could host an AI agent) maintains a (D)TLS connection with
a peer and must execute a high-impact action (e.g., payment initiation,
configuration change, privileged command).</t>
        <ul spacing="normal">
          <li>
            <t>Requirement 1: Before executing a high-impact operation over the existing
connection, the peer must present fresh, connection-bound Evidence
reflecting the current behavior-affecting posture (e.g., enabled capabilities,
policy configuration, runtime permissions).</t>
          </li>
          <li>
            <t>Requirement 2: The mechanism should support lightweight, dynamic attestation
within the existing connection, without necessarily requiring a full new TLS
handshake, so that behavior-affecting posture changes are visible to relying
parties when required by local policy.</t>
          </li>
        </ul>
      </section>
      <section anchor="attestation-of-certificate-private-key">
        <name>Attestation of Certificate Private Key</name>
        <t>A TLS endpoint authenticates itself using an end-entity certificate whose
corresponding private key is claimed to be protected by a secure element.
While standard TLS authentication verifies possession of the private
key, it provides no assurance about where or how that key is stored and used.</t>
        <t>In this scenario, the peer acting as the Relying Party requires additional
assurance that the private key associated with the end-entity certificate used
to authenticate the TLS connection is generated, stored, and used within an
attested cryptographic module. In addition to verifying possession of the
private key via the TLS handshake, the Relying Party seeks
Evidence that the key is non-exportable, remains bound to the
cryptographic module, and that the module is operating in an expected
security configuration at the time the TLS connection is established.</t>
        <t>Remote attestation is used to provide Evidence about the cryptographic module
where the private key used for TLS authentication is stored. The Evidence may
include claims about the security properties of the cryptographic module.
To prevent replay attacks, this Evidence has to be fresh and tied to the
current TLS connection. Replayed Evidence could otherwise be used to falsely
assert key protection properties that no longer hold.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The Attester must be able to produce Evidence that demonstrates
that the private key used for secure channel authentication:
            </t>
            <ul spacing="normal">
              <li>
                <t>is generated and stored within a specific cryptographic module or secure
element,</t>
              </li>
              <li>
                <t>is protected against export or software extraction</t>
              </li>
              <li>
                <t>is attested using fresh Evidence that is bound to the current TLS connection.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The Relying Party uses this Evidence, potentially with the assistance of a
Verifier, to determine whether the key protection properties satisfy its local
security policy.</t>
        <t>The approach described in <xref target="I-D.draft-ietf-rats-pkix-key-attestation"/> addresses this
use case partially by providing attestation of the cryptographic module and associated
private key at certificate issuance time, reflecting their state when the
certificate is enrolled. This model does not provide guarantees about the
continued state of the module at connection establishment or during the lifetime of
the TLS connection.</t>
      </section>
      <section anchor="platform-to-platform-communication">
        <name>Platform-to-platform communication</name>
        <t>Goal: Allow platforms to establish a trustworthy secure channel with each other.</t>
        <t>Use case: Migration of workloads (confidential workloads in particular) between
different platforms. Migration is occasionally required in order to maintain
uptime for the hosted services across periods of scheduled downtime for the
hosting platform. Having remote attestation-enforced policies for such migration
events provides guarantees that the services will not be exposed to lower
security guarantees when migrating. Migration is typically performed by trusted,
low-level components (migration agents) on both source and destination
platforms, which perform the authorization checks and handle the data migration.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The migration agent on the destination platform typically acts
as Attester, proving its state for its peer on the source platform (where the
workload initially resides).</t>
          </li>
          <li>
            <t>Example: Intel TDX offers migration capabilities via its Migration Trust Domain (MigTD)
<xref target="MigTD"/>. Peer MigTDs on the initiating and target platforms set up an
attested TLS connection to perform the migration over.</t>
          </li>
        </ul>
      </section>
      <section anchor="ai-governance-and-accountability">
        <name>AI Governance and Accountability</name>
        <t>Goal: Design framework for governing autonomous AI agents.</t>
        <t>Use case: See <xref target="I-D.aylward-aiga-2"/> for details. Contrary to <xref target="sec-operation-triggered"/>, the entity verifying the Evidence in this case is the governance body and for the purposes of ensuring that no unethical or harmful action is performed.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: Runtime attestation based on agent risk tiers defined in <xref section="2.2" sectionFormat="of" target="I-D.aylward-aiga-2"/></t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document describes use cases and integration properties. The security of
any protocol designed to fulfill these properties will depend on its specific
mechanisms. However, any solution must address the following high-level
considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Replay and Relay Protection: The requirements for cryptographic binding and
freshness are critical. Failure to bind attestation credentials tightly to the
current connection would allow an adversary to replay or relay old or stolen, yet
valid credentials from a compromised system, completely undermining the
security goals.</t>
        </li>
        <li>
          <t>Verifier Trust and Privacy: In the Background Check model, the Relying Party
communicates with a Verifier. This reveals to the Verifier that the Relying
Party is communicating with the Attester. Depending on the scenario, this
could leak sensitive information about business relationships or user
activity. Solutions should consider mechanisms to minimize the data revealed
to the Verifier.</t>
        </li>
        <li>
          <t>Downgrade Attacks: The negotiation of attestation capabilities must be secure.
An active attacker must not be able to trick two parties that both support
attestation into negotiating a connection without it.</t>
        </li>
        <li>
          <t>Evidence Semantics: This document does not define attestation appraisal
policies. However, a Relying Party must be careful when interpreting
Attestation Results. A "valid" attestation only means the Evidence is
authentic and correctly signed; it does not automatically mean the underlying
system is "secure". The Relying Party must have a clear policy for what
measurements, software versions, and security configurations are acceptable.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-informative-references">
      <name>Informative References</name>
      <reference anchor="RFC9334">
        <front>
          <title>Remote ATtestation procedureS (RATS) Architecture</title>
          <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
          <author fullname="D. Thaler" initials="D." surname="Thaler"/>
          <author fullname="M. Richardson" initials="M." surname="Richardson"/>
          <author fullname="N. Smith" initials="N." surname="Smith"/>
          <author fullname="W. Pan" initials="W." surname="Pan"/>
          <date month="January" year="2023"/>
          <abstract>
            <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9334"/>
        <seriesInfo name="DOI" value="10.17487/RFC9334"/>
      </reference>
      <reference anchor="RFC4949">
        <front>
          <title>Internet Security Glossary, Version 2</title>
          <author fullname="R. Shirey" initials="R." surname="Shirey"/>
          <date month="August" year="2007"/>
          <abstract>
            <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="FYI" value="36"/>
        <seriesInfo name="RFC" value="4949"/>
        <seriesInfo name="DOI" value="10.17487/RFC4949"/>
      </reference>
      <reference anchor="I-D.usama-seat-intra-vs-post">
        <front>
          <title>Pre-, Intra- and Post-handshake Attestation</title>
          <author fullname="Muhammad Usama Sardar" initials="M. U." surname="Sardar">
            <organization>TU Dresden</organization>
          </author>
          <date day="22" month="January" year="2026"/>
          <abstract>
            <t>   This document presents a taxonomy of extending TLS protocol with
   remote attestation, referred to as attested TLS.  It also presents
   high-level analysis of benefits and limitations of each category,
   namely pre-handshake attestation, intra-handshake attestation and
   post-handshake attestation.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-usama-seat-intra-vs-post-03"/>
      </reference>
      <reference anchor="I-D.draft-ccc-wimse-twi-extensions">
        <front>
          <title>WIMSE Extensions for Trustworthy Workload Identity</title>
          <author fullname="Mark Novak" initials="M." surname="Novak">
            <organization>J.P. Morgan Chase</organization>
          </author>
          <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
            <organization>arm</organization>
          </author>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <date day="5" month="January" year="2026"/>
          <abstract>
            <t>   This document contains a gap analysis that is the output of the
   Confidential Computing Consortium identifying areas in the IETF WIMSE
   WG work where the current WIMSE architecture should be extended to
   accommodate workloads running in Confidential Computing environments.
   This document contains a high-level outline for these extensions.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ccc-wimse-twi-extensions-01"/>
      </reference>
      <reference anchor="I-D.draft-ietf-rats-eat-measured-component">
        <front>
          <title>Entity Attestation Token (EAT) Measured Component</title>
          <author fullname="Simon Frost" initials="S." surname="Frost">
            <organization>Arm</organization>
          </author>
          <author fullname="Thomas Fossati" initials="T." surname="Fossati">
            <organization>Linaro</organization>
          </author>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
            <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
          </author>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <date day="20" month="February" year="2026"/>
          <abstract>
            <t>   The term "measured component" refers to an object within the
   attester's target environment whose state can be sampled and
   typically digested using a cryptographic hash function.  Examples of
   measured components include firmware stored in flash memory, software
   loaded into memory at start time, data stored in a file system, or
   values in a CPU register.  This document provides the information
   model for the "measured component" and two associated data models.
   This separation is intentional: the JSON and CBOR serializations,
   coupled with the media types and associated Constrained Application
   Protocol (CoAP) Content-Formats, enable the immediate use of the
   semantics within the Entity Attestation Token (EAT) framework.
   Meanwhile, the information model can be reused in future
   specifications to provide additional serializations, for example,
   using ASN.1.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-measured-component-12"/>
      </reference>
      <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
        <front>
          <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
          <author initials="M. U." surname="Sardar">
            <organization/>
          </author>
          <author initials="M." surname="Moustafa">
            <organization/>
          </author>
          <author initials="T." surname="Aura">
            <organization/>
          </author>
          <date year="2025" month="November"/>
        </front>
      </reference>
      <reference anchor="AI-agents" target="https://arxiv.org/abs/2407.01502">
        <front>
          <title>AI agents that matter</title>
          <author initials="S." surname="Kapoor">
            <organization/>
          </author>
          <author initials="B." surname="Stroebl">
            <organization/>
          </author>
          <author initials="Z. S." surname="Siegel">
            <organization/>
          </author>
          <author initials="N." surname="Nadgir">
            <organization/>
          </author>
          <author initials="A." surname="Narayanan">
            <organization/>
          </author>
          <date year="2024" month="July"/>
        </front>
      </reference>
      <reference anchor="MigTD" target="https://github.com/intel/MigTD">
        <front>
          <title>Intel TDX Migration TD</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="I-D.ietf-tls-rfc8446bis">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Independent</organization>
          </author>
          <date day="13" month="September" year="2025"/>
          <abstract>
            <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
      </reference>
      <reference anchor="I-D.ietf-tls-rfc9147bis">
        <front>
          <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
          <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
            <organization>Independent</organization>
          </author>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
            <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
          </author>
          <author fullname="Nagendra Modadugu" initials="N." surname="Modadugu">
            <organization>Google, Inc.</organization>
          </author>
          <date day="20" month="October" year="2025"/>
          <abstract>
            <t>   This document specifies version 1.3 of the Datagram Transport Layer
   Security (DTLS) protocol.  DTLS 1.3 allows client/server applications
   to communicate over the Internet in a way that is designed to prevent
   eavesdropping, tampering, and message forgery.

   The DTLS 1.3 protocol is based on the Transport Layer Security (TLS)
   1.3 protocol and provides equivalent security guarantees with the
   exception of order protection / non-replayability.  Datagram
   semantics of the underlying transport are preserved by the DTLS
   protocol.

   This document obsoletes RFC 6347.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc9147bis-01"/>
      </reference>
      <reference anchor="CVE-2026-33697" target="https://www.cve.org/CVERecord?id=CVE-2026-33697">
        <front>
          <title>CVE-2026-33697</title>
          <author>
            <organization/>
          </author>
          <date>n.d.</date>
        </front>
      </reference>
      <reference anchor="I-D.aylward-aiga-2">
        <front>
          <title>AI Governance and Accountability Protocol (AIGA)</title>
          <author fullname="Edward Richard Aylward Jr" initials="E. R." surname="Aylward">
         </author>
          <date day="26" month="January" year="2026"/>
          <abstract>
            <t>   This document specifies the AI Governance and Accountability (AIGA)
   Protocol, a practical, economically viable, and technically
   enforceable framework for governing autonomous AI agents.  AIGA is
   designed to address real-world deployment constraints, adversarial
   agent scenarios, and economic incentive alignment.

   The protocol is founded on a Tiered Risk-Based Governance model,
   applying proportional oversight to agents based on their
   capabilities.  All agents are governed by an Immutable Kernel
   Architecture which provides a non-modifiable Trusted Computing Base
   (TCB) for enforcing policy.  This is combined with Action-Based
   Authorization, where critical operations require real-time approval.

   To solve the single-point-of-failure problem, the protocol uses a
   Federated Authority Network of regional, cross-validating hubs and
   provides a Network-Level Quarantine Protocol for enforcement.  The
   entire framework is designed around Economic Incentive Alignment,
   making compliance the most economically rational choice for
   operators.

   For high-assurance (T3-T4) scenarios, AIGA specifies advanced,
   redundant mechanisms including Multi-Vendor TEE Attestation (M-TACE),
   AI "Warden Triumvirate" Triage, Human Review Board (HRB) Multi-
   Signature, Peer Consensus Failsafe &amp; Identity Rotation, and Double
   Ratchet Cryptography.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-aylward-aiga-2-00"/>
      </reference>
      <reference anchor="I-D.draft-ietf-rats-pkix-key-attestation">
        <front>
          <title>Evidence Encoding for Hardware Security Modules</title>
          <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
            <organization>Cryptic Forest Software</organization>
          </author>
          <author fullname="Jean-Pierre Fiset" initials="J." surname="Fiset">
            <organization>Crypto4A Inc.</organization>
          </author>
          <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
            <organization>University of the Bundeswehr Munich</organization>
          </author>
          <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
            <organization>Fraunhofer SIT</organization>
          </author>
          <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
          <author fullname="Ned Smith" initials="N." surname="Smith">
         </author>
          <date day="17" month="March" year="2026"/>
          <abstract>
            <t>   This document specifies a vendor-agnostic format for Evidence
   produced and verified within a PKIX context.  The Evidence produced
   this way includes claims collected about a cryptographic module, such
   as a Hardware Security Module (HSM), and elements found within it
   such as cryptographic keys.

   One scenario envisaged is that the state information about the
   cryptographic module can be securely presented to a remote operator
   or auditor in a vendor-agnostic verifiable format.  A more complex
   scenario would be to submit this Evidence to a Certification
   Authority to aid in determining whether the storage properties of
   this key meet the requirements of a given certificate profile.

   This specification also offers a format for requesting a
   cryptographic module to produce Evidence tailored for expected use.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-rats-pkix-key-attestation-05"/>
      </reference>
    </references>
    <?line 467?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
