<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-fatt-extension-05" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title>Extensions to TLS FATT Process</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-fatt-extension-05"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="April" day="20"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 55?>

<t>This document applies only to non-trivial extensions of TLS, which require formal analysis. It proposes the authors specify a threat model and informal security goals in the Security Considerations section, as well as motivation and a protocol diagram in the draft.
We also briefly present a few pain points of the team doing the formal analysis which -- we believe -- require refining the process:</t>
      <ul spacing="normal">
        <li>
          <t>Provide protection against FATT-bypass by other TLS-related WGs</t>
        </li>
        <li>
          <t>Contacting FATT</t>
        </li>
        <li>
          <t>ML-KEM</t>
        </li>
        <li>
          <t>Understanding the opposing goals</t>
        </li>
        <li>
          <t>Response within reasonable time frame</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/tls-fatt-extension/draft-usama-tls-fatt-extension.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-fatt-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/tls-fatt-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 66?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While the TLS FATT process <xref target="TLS-FATT"/> marks a historic change in achieving high cryptographic assurances by tightly integrating formal methods in the working group (WG) process, the current FATT process has some practical limitations. Given a relatively smaller formal methods community, and a steep learning curve as well as very low consideration of usability in the existing formal analysis tools, this document proposes some solutions to make the FATT process sustainable.</t>
      <t>Specifically, the TLS FATT process does not outline the division of responsibility between the authors and the team doing the formal analysis (the latter is hereafter referred to as the "Verifier"). This document aims to propose some solutions without putting an extensive burden on either party.</t>
      <t>An argument is often presented by the authors that an Internet-Draft is written for the implementers. We make several counter-arguments here:</t>
      <ul spacing="normal">
        <li>
          <t>Researchers and protocol designers are also stakeholders of such specifications <xref target="I-D.irtf-cfrg-cryptography-specification"/>.</t>
        </li>
        <li>
          <t>Even implementers may like to understand the security implications before blindly starting to implement it.</t>
        </li>
        <li>
          <t>With the FATT process, this argument is clearly invalid. The Verifier may not be an implementer.</t>
        </li>
      </ul>
      <t>This document outlines the corresponding changes in the way Internet-Drafts are typically written.
For the Internet-Draft to be useful for the formal analysis, this document proposes that the draft should contain four main items, namely:</t>
      <ul spacing="normal">
        <li>
          <t>motivation,</t>
        </li>
        <li>
          <t>a threat model,</t>
        </li>
        <li>
          <t>informal security goals, and</t>
        </li>
        <li>
          <t>a protocol diagram (<xref target="sec-prot-diagram"/>).</t>
        </li>
      </ul>
      <t>Each one of these is summarized in <xref target="sec-res-authors"/>. Future versions of this draft will include concrete examples.</t>
      <t>Responsibilities of the Verifier are summarized in <xref target="sec-res-verifier"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>A clear separation of responsibilities would help IRTF UFMRG to train the authors and verifiers separately to fulfill their own responsibilities.</t>
        <t>Moreover, we believe that the experiences can help improve the FATT process. The goal is to document the identified gaps with concrete examples, discuss those and mutually find the best way forward.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is only non-trivial extensions of TLS, which require formal analysis.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="sec-prot-diagram">
        <name>Protocol Diagram</name>
        <t>In the context of this document, a Protocol Diagram specifies the proposed cryptographically-relevant changes compared to the standard TLS protocol <xref target="I-D.ietf-tls-rfc8446bis"/>. This is conceptually similar to the Protocol Model in <xref target="RFC4101"/>. However, while <xref target="RFC4101"/> only recommends diagrams, we consider diagrams to be essential.</t>
      </section>
      <section anchor="verifier">
        <name>Verifier</name>
        <t>In this document, the Verifier refers to the team doing the formal analysis.
Note that it is NOT a new formal role in the WG process.</t>
      </section>
      <section anchor="definition-of-attack">
        <name>Definition of Attack</name>
        <t>Any ambiguity originating from the threat model, informal security goals, and a Protocol Diagram is to be considered as an attack.
The authors are, therefore, encouraged to be as precise as possible.
The Verifier may propose text for consideration by authors/WG to disambiguate or propose a fix to the attack.</t>
      </section>
    </section>
    <section anchor="sec-pain-points">
      <name>Pain Points of Verifier</name>
      <t>From the two extremes -- <xref target="I-D.ietf-tls-8773bis"/> where Russ kindly provided all requested inputs and we were able to get it through (with a <eref target="https://mailarchive.ietf.org/arch/msg/tls/6Wk82oBGd61rTK23DgfYb7BmRKM/">small change</eref>) without any formal analysis to <xref target="I-D.fossati-tls-attestation-08"/> where formal analysis revealed vulnerabilities <xref target="ID-Crisis"/> and resulted in a separate WG to tackle this problem -- we summarize the pain points of the Verifier with the hope that we can refine the process.</t>
      <t>Note that we are not at all asserting that the authors have no pain points. They very likely have their own -- that is another indication that the process needs a refinement.</t>
      <section anchor="provide-protection-against-fatt-bypass-by-other-tls-related-wgs">
        <name>Provide Protection Against FATT-bypass by Other TLS-related WGs</name>
        <t>TLS-related WGs in particular those where the representation of TLS WG is a minority -- including the one (SEAT WG) that the author has defended himself as one of the six proponents -- <bcp14>MUST NOT</bcp14> be allowed to make changes to the TLS protocol beyond what is explicitly allowed in their charter.</t>
        <t>If rechartering of such WGs is <em>absolutely unavoidable</em> and includes non-trivial changes to the TLS protocol, it <bcp14>MUST</bcp14> only be done after agreement with the TLS WG. This will prevent the short-circuit path for FATT. If the WG does not have proper FATT-like process, TLS WG may request FATT review before WGLC.</t>
        <t>In short, our concern is:</t>
        <artwork><![CDATA[
What's the point of such a TLS FATT process when other WGs
can simply bypass this process to make key schedule level changes?
]]></artwork>
        <t>For example, <xref target="I-D.fossati-seat-early-attestation-00"/> makes key schedule level changes, breaks the SEAT WG charter and SEAT WG has no formal FATT-like process.</t>
      </section>
      <section anchor="contacting-fatt">
        <name>Contacting FATT</name>
        <t>The FATT process restricts the Verifier from contacting the FATT directly.
We argue that the Verifier should be allowed to contact the FATT (at least the FATT person for a specific draft) because of the following reasons:</t>
        <ul spacing="normal">
          <li>
            <t>Formal methods community is small and within this small community, those with deep knowledge of TLS are quite limited.</t>
          </li>
        </ul>
        <artwork><![CDATA[
Such a restriction would not have been there if the Verifier
were not a member of the TLS WG and analyzing the same draft
and free to contact the same FATT for advice. Being a member
of the TLS WG actually puts the Verifier at unnecessary disadvantage.
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The feedback we receive on the list is really limited.</t>
          </li>
          <li>
            <t>Communication via chairs is a source of misunderstandings, as it has already happened with the chairs summarizing the intent of "Tamarin-like" to just "Tamarin".</t>
          </li>
        </ul>
        <artwork><![CDATA[
FATT is a 'design team' as per {{RFC2418}}. We kindly request
clarification under which regulation chairs can stop the
Verifier from talking to a design team?
]]></artwork>
      </section>
      <section anchor="sec-ml-kem">
        <name>ML-KEM</name>
        <artwork><![CDATA[
We believe the security considerations of {{I-D.ietf-tls-mlkem}} are
insufficient. We also believe FATT review could have significantly
improved it, including but not limited to the preference of hybrids.
We have provided significant feedback during the two WGLCs. However,
almost none of that is actually reflected in the updated editor's
version.
]]></artwork>
        <section anchor="formal-analysis-work-in-progress">
          <name>Formal analysis (Work-in-progress)</name>
          <t>We have presented observation from our ongoing symbolic security analysis
(cf. limitations in <xref target="sec-sec-cons"/>) using ProVerif on the mailing list.</t>
          <t>We argue that in general:</t>
          <ol spacing="normal" type="1"><li>
              <t>Migration from ECDHE to hybrid is security improvement.</t>
            </li>
            <li>
              <t>Migration from hybrid to pure ML-KEM is security regression.</t>
            </li>
          </ol>
          <section anchor="hybrid-pqt">
            <name>Hybrid PQ/T</name>
            <t>More formally, the property hybrid PQ/T should provide is:</t>
            <artwork><![CDATA[
Hybrid PQ/T is secure unless both ECDHE and ML-KEM are broken.
]]></artwork>
            <t>Hybrid preserves ECDHE, and adds ML-KEM as an additional factor. So as
long as one of them is not broken, the system is secure. In particular, even if ML-KEM is
completely broken, the system retains the security level of ECDHE.</t>
          </section>
          <section anchor="non-hybrid-pq">
            <name>Non-hybrid PQ</name>
            <t>On the other hand, the formal property non-hybrid PQ provides is:</t>
            <artwork><![CDATA[
Non-hybrid PQ is secure unless ML-KEM is broken.
]]></artwork>
            <t>If ML-KEM is broken, the whole system is broken.</t>
          </section>
          <section anchor="comparison">
            <name>Comparison</name>
            <t>Leak out the ECDHE key from hybrid PQ/T and you get a pure ML-KEM. Clearly, hybrid is
in general more secure, unless ECDHE is fully broken, in which case it still falls
equivalent to pure ML-KEM, or in the hypothetical scenario that there is an implementation
bug in the ECDHE part which is triggered only in composition.</t>
          </section>
        </section>
        <section anchor="cost">
          <name>"Cost"</name>
          <t>"Cost" has been presented on the list as the motivation for ML-KEM but no authentic reference has yet been presented. There seems to be a need for a thorough study to understand the "cost."</t>
        </section>
      </section>
      <section anchor="understanding-the-opposing-goals">
        <name>Understanding the Opposing Goals</name>
        <t>The authors need to understand that the task of the Verifier is to find the subtle corner cases where the protocol may fail.
This is naturally opposed to the goal of the authors -- that is, to convince the WG that the protocol is good enough to be adopted/published.</t>
        <artwork><![CDATA[
Unless the Verifier remains really focused on checking subtleties,
there is little value of formal analysis.
]]></artwork>
        <t>In particular, some topics like remote attestation need more precise specifications because small changes or ambiguites may make a big difference.</t>
      </section>
      <section anchor="response-within-reasonable-time-frame">
        <name>Response within reasonable time frame</name>
        <t>If authors do not respond to the Verifier's questions within a reasonable time frame (say a few weeks but not months), the Verifier may not pursue formal analysis of their draft.</t>
      </section>
    </section>
    <section anchor="proposed-solutions">
      <name>Proposed solutions</name>
      <t>In addition to those mentioned inline in the previous section, we propose the following:</t>
      <section anchor="scope-of-fatt">
        <name>Scope of FATT</name>
        <ul spacing="normal">
          <li>
            <t>Be more explicit on:
            </t>
            <ul spacing="normal">
              <li>
                <t>what is the scope of FATT?</t>
              </li>
              <li>
                <t>what kind of drafts need FATT review and why?
Discussion on this is happening in <eref target="https://github.com/tlswg/tls-fatt/issues/19">issue 19</eref>.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-discuss-meetings">
        <name>Discussion at Meeting</name>
        <artwork><![CDATA[
Formal analysis -- just like any other code development -- is an
iterative process and needs to be progressively discussed with
the WG (and not just authors!) to be able to propose secure
solutions.
]]></artwork>
        <t>So at least some time should be allocated in the meetings for discussion of formal analysis.</t>
        <t>If the authors are doing the formal analysis themselves, it would be helpful to also present the current state of formal analysis in meetings for discussion. This may be a single slide describing:</t>
        <ul spacing="normal">
          <li>
            <t>Approach used: symbolic or computational</t>
          </li>
          <li>
            <t>Tool used: ProVerif, CryptoVerif etc.</t>
          </li>
          <li>
            <t>Properties established</t>
          </li>
        </ul>
        <t>This will help the Verifier give any feedback and avoid any repititive effort.</t>
      </section>
    </section>
    <section anchor="sec-res-authors">
      <name>Responsibilities of Authors</name>
      <t>This document proposes that the authors provide the following four items:</t>
      <section anchor="motivation-1">
        <name>Motivation</name>
        <t>The motivation of the work (i.e., the proposed extension of TLS) needs to primarily come from the authors.
The Verifier can ask questions to improve it, but he cannot just cook it up.</t>
      </section>
      <section anchor="sec-th-model">
        <name>Threat Model</name>
        <t>A threat model identifies which threats are in scope for the protocol design. So it should answer questions like:</t>
        <ul spacing="normal">
          <li>
            <t>What are the capabilities of the adversary? What can the adversary do?</t>
          </li>
          <li>
            <t>Whether post-quantum threats are in scope?</t>
          </li>
          <li>
            <t>What can go wrong in the system? etc.</t>
          </li>
        </ul>
        <section anchor="typical-dolev-yao-adversary">
          <name>Typical Dolev-Yao adversary</name>
          <t>A typical threat model assumes the classical Dolev-Yao adversary, who has full control over the communication channel.</t>
          <t>Any additional adversary capabilities and assumptions must be explicitly stated.</t>
        </section>
        <section anchor="potential-weaknesses-of-cryptographic-primitives">
          <name>Potential Weaknesses of Cryptographic Primitives</name>
          <t>In general, it also outlines the potential weaknesses of the cryptographic primitives used in the proposed protocol extension. Examples include:</t>
          <ul spacing="normal">
            <li>
              <t>weak hash functions</t>
            </li>
            <li>
              <t>weak Diffie-Hellman (DH) groups</t>
            </li>
            <li>
              <t>weak elements within strong DH groups</t>
            </li>
          </ul>
        </section>
        <section anchor="keys">
          <name>Keys</name>
          <t>This section should specify any keys in the system (e.g., long-term keys of the server) in addition to the standard TLS key schedule. Theoretically and arguably practically, any key may be compromised (i.e., become available to the adversary).</t>
          <t>For readability, we propose defining each key clearly as in Section 4.1 of <xref target="ID-Crisis"/>. Alternatively, present as a table with the following entries for each key:</t>
          <ul spacing="normal">
            <li>
              <t>Name (or symbol) of the key</t>
            </li>
            <li>
              <t>Purpose of the key</t>
            </li>
            <li>
              <t>(optionally but preferably -- particularly when the endpoint is not fully trusted) Which software in the system has access to the key?</t>
            </li>
          </ul>
          <t>If more than one servers are involved (such as migration cases), the keys for servers should be distinguished in an unambiguous way.</t>
        </section>
      </section>
      <section anchor="informal-security-goals">
        <name>Informal Security Goals</name>
        <t>Knowing what you want is the first step toward achieving it. Hence, informal security goals such as integrity, authentication, freshness, etc. should be outlined in the Internet-Draft.
If the informal security goals are not spelled out in the Internet-Draft, it is safe to assume that the goals are still unclear to the authors.</t>
        <t>Examples:</t>
        <ul spacing="normal">
          <li>
            <t>Integrity of message X holds unless some key Y is leaked.</t>
          </li>
          <li>
            <t>Freshness of message X holds unless some key Y or some key Z is leaked.</t>
          </li>
          <li>
            <t>Server Authentication holds unless some key Y or some key Z is leaked.</t>
          </li>
        </ul>
        <t>See Section 5.1 of <xref target="ID-Crisis"/> for concrete examples.</t>
      </section>
      <section anchor="protocol-diagram">
        <name>Protocol Diagram</name>
        <t>A Protocol Diagram should clearly mention the initial knowledge of the protocol participants, e.g., which authentic public keys are known to the protocol participants at the start of the protocol. An example of a Protocol Diagram for <xref target="I-D.fossati-tls-attestation-08"/> is provided in Figure 5 in <xref target="ID-Crisis"/>.</t>
      </section>
    </section>
    <section anchor="document-structure">
      <name>Document Structure</name>
      <t>While the needs may differ for some drafts, we propose the following baseline template, with an example of <xref target="I-D.wang-tls-service-affinity"/>:</t>
      <t>The template is:</t>
      <ul spacing="normal">
        <li>
          <t>Easy for readers</t>
        </li>
        <li>
          <t>Easy for reviewers</t>
        </li>
        <li>
          <t>Easy for formal analysis</t>
        </li>
      </ul>
      <t>TODO: Currently it is almost a copy of the <eref target="https://mailarchive.ietf.org/arch/msg/tls/LfIHs1OVwDKWmDuCEx0p8wP-KPs/">guidance email</eref> to the authors. We will add details in next versions.</t>
      <section anchor="introduction-1">
        <name>Introduction</name>
        <ul spacing="normal">
          <li>
            <t>Problem statement: Say in general what the problem is.</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, we believe this
 should <em>not</em> include CATS. Anyone unfamiliar with CATS should be
 able to understand your problem.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>Define any terms not defined in RFC8446bis or point to other drafts from where the definition is used.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation-and-design-rationale">
        <name>Motivation and design rationale</name>
        <ul spacing="normal">
          <li>
            <t>We really like how Russ motivates the problem statement in <xref target="I-D.ietf-tls-8773bis"/>. Use it as a sample.</t>
          </li>
          <li>
            <t>Here authors should address all the concerns from WG, including
 justification with compelling arguments and authentic references
 why authors think it should be done within TLS WG (and within handshake).</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, authors could put CATS here as a motivational use case.</t>
          </li>
        </ul>
      </section>
      <section anchor="proposed-solution-one-or-more-sections">
        <name>Proposed solution (one or more sections)</name>
        <ul spacing="normal">
          <li>
            <t>Protocol design with Protocol Diagram: we work on the formal analysis of TLS 1.3 exclusively. Please contact someone else if your draft relates to older versions.</t>
          </li>
        </ul>
      </section>
      <section anchor="security-considerations">
        <name>Security considerations</name>
        <section anchor="threat-model">
          <name>Threat model</name>
        </section>
        <section anchor="desired-security-goals">
          <name>Desired security goals</name>
          <t>As draft proceeds these desired security goals will become what the draft actually achieves.</t>
        </section>
        <section anchor="other-security-implicationsconsiderations">
          <name>Other security implications/considerations</name>
        </section>
      </section>
    </section>
    <section anchor="sec-res-verifier">
      <name>Responsibilities of Verifier</name>
      <t>When the authors declare the version as ready for formal analysis, the Verifier takes the above inputs, performs the formal analysis, and brings the results back to the authors and the WG. Based on the analysis, the verifier may propose updates to the Security Considerations section or other sections of the Internet-Draft.</t>
    </section>
    <section anchor="sec-sec-cons">
      <name>Security Considerations</name>
      <t>The whole document is about improving security considerations.</t>
      <t>Like all security proofs, formal analysis is only as strong as its assumptions and model. The scope is typically limited, and the model does not necessarily capture real-world deployment complexity, implementation details, operational constraints, or misuse scenarios. Formal methods should be used as complementary and not as subtitute of other analysis methods.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS-FATT" target="https://github.com/tlswg/tls-fatt">
          <front>
            <title>TLS FATT Process</title>
            <author>
              <organization>IETF TLS WG</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation-08">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="RFC4101">
          <front>
            <title>Writing Protocol Models</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author>
              <organization abbrev="IAB">Internet Architecture Board</organization>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>The IETF process depends on peer review. However, IETF documents are generally written to be useful for implementors, not reviewers. In particular, while great care is generally taken to provide a complete description of the state machines and bits on the wire, this level of detail tends to get in the way of initial understanding. This document describes an approach for providing protocol "models" that allow reviewers to quickly grasp the essence of a system. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4101"/>
          <seriesInfo name="DOI" value="10.17487/RFC4101"/>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-8773bis">
          <front>
            <title>TLS 1.3 Extension for Using Certificates with an External Pre-Shared Key</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date day="5" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS 1.3 extension that allows TLS clients
   and servers to authenticate with certificates and provide
   confidentiality based on encryption with a symmetric key from the
   usual key agreement algorithm and an external pre-shared key (PSK).
   This Standards Track RFC (once approved) obsoletes RFC 8773, which
   was an Experimental RFC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-8773bis-13"/>
        </reference>
        <reference anchor="I-D.fossati-seat-early-attestation-00">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="9" month="January" year="2026"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using remote attestation
   which is a process by which an entity produces Evidence about itself
   that another party can use to appraise whether that entity is found
   in a secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enable the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation Evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and to use them mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-seat-early-attestation-00"/>
        </reference>
        <reference anchor="RFC8773bis">
          <front>
            <title>TLS 1.3 Extension for Certificate-Based Authentication with an External Pre-Shared Key</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="March" year="2020"/>
            <abstract>
              <t>This document specifies a TLS 1.3 extension that allows a server to authenticate with a combination of a certificate and an external pre-shared key (PSK).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8773"/>
          <seriesInfo name="DOI" value="10.17487/RFC8773"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mlkem">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as
   NamedGroups and and registers IANA values in the TLS Supported Groups
   registry for use in TLS 1.3 to achieve post-quantum (PQ) key
   establishment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-07"/>
        </reference>
        <reference anchor="I-D.wang-tls-service-affinity">
          <front>
            <title>Service Affinity Solution based on Transport Layer Security (TLS)</title>
            <author fullname="Wei Wang" initials="W." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Mohit Sahni" initials="M." surname="Sahni">
              <organization>Palo Alto Networks</organization>
            </author>
            <author fullname="Ketul Sheth" initials="K." surname="Sheth">
              <organization>Palo Alto Networks</organization>
            </author>
            <date day="8" month="April" year="2026"/>
            <abstract>
              <t>   This draft proposes a service affinity solution between client and
   server based on Transport Layer Security (TLS).  An extension to
   Transport Layer Security (TLS) 1.3 to enable session migration.  This
   mechanism is designed for network architectures, particularly for
   multi-homed servers that possess multiple network interfaces and IP
   addresses.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wang-tls-service-affinity-01"/>
        </reference>
        <reference anchor="RFC2418">
          <front>
            <title>IETF Working Group Guidelines and Procedures</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="September" year="1998"/>
            <abstract>
              <t>This document describes the guidelines and procedures for formation and operation of IETF working groups. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="25"/>
          <seriesInfo name="RFC" value="2418"/>
          <seriesInfo name="DOI" value="10.17487/RFC2418"/>
        </reference>
      </references>
    </references>
    <?line 402?>

<section numbered="false" anchor="appendix">
      <name>Appendix</name>
      <section numbered="false" anchor="document-history">
        <name>Document History</name>
        <t>-05</t>
        <ul spacing="normal">
          <li>
            <t>Removed process-related stuff</t>
          </li>
          <li>
            <t>Moved discussion at meeting to solutions</t>
          </li>
          <li>
            <t>Added ML-KEM</t>
          </li>
        </ul>
        <t>-04</t>
        <ul spacing="normal">
          <li>
            <t>Extended threat model <xref target="sec-th-model"/></t>
          </li>
          <li>
            <t>Helpful discussions on formal analysis in meetings in <xref target="sec-discuss-meetings"/></t>
          </li>
          <li>
            <t>Pointer to formal analysis and costs in <xref target="sec-ml-kem"/></t>
          </li>
        </ul>
        <t>-03</t>
        <ul spacing="normal">
          <li>
            <t>Limitations of formal analysis in security considerations</t>
          </li>
          <li>
            <t>Proposed solutions section</t>
          </li>
          <li>
            <t>More guidance for authors: Threat Model and Informal Security Goals</t>
          </li>
        </ul>
        <t>-02</t>
        <ul spacing="normal">
          <li>
            <t>Added document structure</t>
          </li>
          <li>
            <t>FATT-bypass by Other TLS-related WGs</t>
          </li>
          <li>
            <t>FATT process not being followed</t>
          </li>
        </ul>
        <t>-01</t>
        <ul spacing="normal">
          <li>
            <t>Pain points of Verifier <xref target="sec-prot-diagram"/></t>
          </li>
          <li>
            <t>Small adjustment of phrasing</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thankfully acknowledge Eric Rescorla and John Mattsson for their valuable input.</t>
      <t>The research work is funded by Deutsche Forschungsgemeinschaft.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
