<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.35 (Ruby 3.4.9) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-fatt-extension-06" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.33.0 -->
  <front>
    <title>Extensions to TLS FATT Process</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-fatt-extension-06"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="April" day="26"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 54?>

<t>This document applies only to non-trivial extensions of TLS, which require formal analysis. It proposes the authors specify a threat model and informal security goals in the Security Considerations section, as well as motivation and a protocol diagram in the draft.
We also briefly present a few pain points of the team doing the formal analysis which -- we believe -- require refining the process:</t>
      <ul spacing="normal">
        <li>
          <t>Provide protection against FATT-bypass by other TLS-related WGs</t>
        </li>
        <li>
          <t>Contacting FATT</t>
        </li>
        <li>
          <t>ML-KEM</t>
        </li>
        <li>
          <t>Understanding the opposing goals</t>
        </li>
        <li>
          <t>Response within reasonable time frame</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/tls-fatt-extension/draft-usama-tls-fatt-extension.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-fatt-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/tls-fatt-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 65?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While the TLS FATT process <xref target="TLS-FATT"/> marks a historic change in achieving high cryptographic assurances by tightly integrating formal methods in the working group (WG) process, the current FATT process has some practical limitations. Given a relatively smaller formal methods community, and a steep learning curve as well as very low consideration of usability in the existing formal analysis tools, this document proposes some solutions to make the FATT process sustainable.</t>
      <t>Specifically, the TLS FATT process does not outline the division of formal analysis work between the authors and the WG members doing the formal analysis (the latter is hereafter referred to as the "Verifier" for convenience). This document aims to propose some solutions without putting an extensive burden on either party.</t>
      <t>An argument is often presented by the authors that an Internet-Draft is written for the implementers. We make several counter-arguments here:</t>
      <ul spacing="normal">
        <li>
          <t>Researchers and protocol designers are also stakeholders of such specifications <xref target="I-D.irtf-cfrg-cryptography-specification"/>.</t>
        </li>
        <li>
          <t>Even implementers may like to understand the security implications before blindly starting to implement it.</t>
        </li>
        <li>
          <t>With the FATT process, this argument is clearly invalid. The Verifier may not be an implementer.</t>
        </li>
      </ul>
      <t>This document outlines the corresponding changes in the way Internet-Drafts are typically written.
For the Internet-Draft to be useful for the formal analysis, this document proposes that the draft should contain four main items, namely:</t>
      <ul spacing="normal">
        <li>
          <t>motivation,</t>
        </li>
        <li>
          <t>a threat model,</t>
        </li>
        <li>
          <t>informal security goals, and</t>
        </li>
        <li>
          <t>a protocol diagram (<xref target="sec-prot-diagram"/>).</t>
        </li>
      </ul>
      <t>Each one of these is summarized in <xref target="sec-res-authors"/>. Future versions of this draft will include concrete examples.</t>
      <t>Expected contributions of the Verifier are summarized in <xref target="sec-res-verifier"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>A clear separation of expected contributions would help IRTF UFMRG to train the authors and Verifiers separately to fulfill their own formal analysis work.</t>
        <t>Moreover, we believe that the experiences can help improve the FATT process. The goal is to document the identified gaps with concrete examples, discuss those and mutually find the best way forward.</t>
      </section>
      <section anchor="scope">
        <name>Scope</name>
        <t>The scope of this document is only non-trivial extensions of TLS, which require formal analysis.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="sec-prot-diagram">
        <name>Protocol Diagram</name>
        <t>In the context of this document, a Protocol Diagram specifies the proposed cryptographically-relevant changes compared to the standard TLS protocol <xref target="I-D.ietf-tls-rfc8446bis"/>. This is conceptually similar to the Protocol Model in <xref target="RFC4101"/>. However, while <xref target="RFC4101"/> only recommends diagrams, we consider diagrams to be essential.</t>
      </section>
      <section anchor="verifier">
        <name>Verifier</name>
        <t>In this document, the Verifier refers to the <strong>WG members</strong> doing the formal analysis.
Note that it is <strong>NOT</strong> a new formal role in the WG process.</t>
      </section>
      <section anchor="definition-of-attack">
        <name>Definition of Attack</name>
        <t>Any ambiguity originating from the threat model, informal security goals, and a Protocol Diagram is to be considered as an attack.
The authors are, therefore, encouraged to be as precise as possible.
The Verifier may propose text for consideration by authors/WG to disambiguate or propose a fix to the attack.</t>
      </section>
    </section>
    <section anchor="sec-pain-points">
      <name>Pain Points of Verifier</name>
      <t>From the two extremes -- <xref target="I-D.ietf-tls-8773bis"/> where Russ kindly provided all requested inputs and we were able to get it through (with a <eref target="https://mailarchive.ietf.org/arch/msg/tls/6Wk82oBGd61rTK23DgfYb7BmRKM/">small change</eref>) without any formal analysis to <xref target="I-D.fossati-tls-attestation-08"/> where formal analysis revealed vulnerabilities <xref target="ID-Crisis"/> and resulted in a separate WG to tackle this problem -- we summarize the pain points of the Verifier with the hope that we can refine the process.</t>
      <t>Note that we are not at all asserting that the authors have no pain points. They very likely have their own -- that is another indication that the process needs a refinement.</t>
      <section anchor="provide-protection-against-fatt-bypass-by-other-tls-related-wgs">
        <name>Provide Protection Against FATT-bypass by Other TLS-related WGs</name>
        <t>TLS-related WGs in particular those where the representation of TLS WG is a minority -- including the one (SEAT WG) that the author has defended himself as one of the six proponents -- <bcp14>MUST NOT</bcp14> be allowed to make changes to the TLS protocol beyond what is explicitly allowed in their charter.</t>
        <t>If rechartering of such WGs is <em>absolutely unavoidable</em> and includes non-trivial changes to the TLS protocol, it <bcp14>MUST</bcp14> only be done after agreement with the TLS WG. This will prevent the short-circuit path for FATT. If the WG does not have proper FATT-like process, TLS WG may request FATT review before WGLC.</t>
        <t>In short, our concern is:</t>
        <artwork><![CDATA[
What's the point of such a TLS FATT process when other WGs
can simply bypass this process to make key schedule level changes?
]]></artwork>
        <t>For example, <xref target="I-D.fossati-seat-early-attestation-00"/> makes key schedule level changes, breaks the SEAT WG charter and SEAT WG has no formal FATT-like process.</t>
      </section>
      <section anchor="contacting-fatt">
        <name>Contacting FATT</name>
        <t>According to FATT process <xref target="TLS-FATT"/>, FATT is a 'design team' as per <xref target="RFC2418"/> (also see <eref target="https://datatracker.ietf.org/doc/statement-iesg-on-design-teams-20011221/">this</eref>).</t>
        <t>The FATT process restricts the WG members -- except for <strong>authors</strong> -- from contacting the FATT directly.
This creates an unjustified situation where the authors have an <strong>exclusive</strong> access to FATT.
We argue that WG members -- including the Verifier -- should also be allowed to contact the FATT because of the following reasons:</t>
        <ul spacing="normal">
          <li>
            <t>Formal methods community is small and within this small community, those with deep knowledge of TLS are quite limited.</t>
          </li>
        </ul>
        <artwork><![CDATA[
Such a restriction would not have been there if the Verifier
were not a member of the TLS WG and analyzing the same draft
and free to contact the same FATT for advice. Being a member
of the TLS WG actually puts the Verifier at unnecessary disadvantage.
]]></artwork>
        <ul spacing="normal">
          <li>
            <t>The feedback we receive on the list is really limited.</t>
          </li>
          <li>
            <t>Communication via chairs is a source of misunderstandings, as it has already happened with the chairs summarizing the intent of "Tamarin-like" to just "Tamarin".</t>
          </li>
        </ul>
        <t>Our proposed solution for this point is in <xref target="sec-contact-fatt"/>.</t>
      </section>
      <section anchor="sec-ml-kem">
        <name>ML-KEM</name>
        <artwork><![CDATA[
We believe the security considerations of {{I-D.ietf-tls-mlkem}} are
insufficient. We also believe FATT review could have significantly
improved it, including but not limited to the preference of hybrids.
We have provided significant feedback during the two WGLCs. However,
almost none of that is actually reflected in the updated editor's
version.
]]></artwork>
        <t>Our proposed solution for this point is in <xref target="sec-sol-ml-kem"/>.</t>
        <section anchor="formal-analysis-work-in-progress">
          <name>Formal analysis (Work-in-progress)</name>
          <t>We have presented observation from our ongoing symbolic security analysis
(cf. limitations in <xref target="sec-sec-cons"/>) using ProVerif on the mailing list.</t>
          <t>We argue that in general:</t>
          <ol spacing="normal" type="1"><li>
              <t>Migration from ECDHE to hybrid is security improvement.</t>
            </li>
            <li>
              <t>Migration from hybrid to non-hybrid ML-KEM is security regression.</t>
            </li>
          </ol>
          <section anchor="hybrid-pqt">
            <name>Hybrid PQ/T</name>
            <t>More formally, the property hybrid PQ/T should provide is:</t>
            <artwork><![CDATA[
Hybrid PQ/T is secure unless both ECDHE and ML-KEM are broken.
]]></artwork>
            <t>Hybrid preserves ECDHE, and adds ML-KEM as an additional factor. So as
long as one of them is not broken, the system is secure. In particular, even if ML-KEM is
completely broken, the system retains the security level of ECDHE.</t>
          </section>
          <section anchor="non-hybrid-pq">
            <name>Non-hybrid PQ</name>
            <t>On the other hand, the formal property non-hybrid PQ provides is:</t>
            <artwork><![CDATA[
Non-hybrid PQ is secure unless ML-KEM is broken.
]]></artwork>
            <t>If ML-KEM is broken, the whole system is broken.</t>
          </section>
          <section anchor="comparison">
            <name>Comparison</name>
            <t>Leak out the ECDHE key from hybrid PQ/T and you get a non-hybrid ML-KEM. Clearly, hybrid is
in general more secure, unless ECDHE is fully broken, in which case it still falls
equivalent to non-hybrid ML-KEM, or in the hypothetical scenario that there is an implementation
bug in the ECDHE part which is triggered only in composition.</t>
          </section>
        </section>
        <section anchor="cost">
          <name>"Cost"</name>
          <t>"Cost" has been presented on the list as the motivation for ML-KEM but no authentic reference has yet been presented. There seems to be a need for a thorough study to understand the "cost."</t>
        </section>
      </section>
      <section anchor="understanding-the-opposing-goals">
        <name>Understanding the Opposing Goals</name>
        <t>The authors need to understand that the task of the Verifier is to find the subtle corner cases where the protocol may fail.
This is naturally opposed to the goal of the authors -- that is, to convince the WG that the protocol is good enough to be adopted/published.</t>
        <artwork><![CDATA[
Unless the Verifier remains really focused on checking subtleties,
there is little value of formal analysis.
]]></artwork>
        <t>In particular, some topics like remote attestation need more precise specifications because small changes or ambiguites may make a big difference.</t>
      </section>
      <section anchor="response-within-reasonable-time-frame">
        <name>Response within reasonable time frame</name>
        <t>If authors do not respond to the Verifier's questions within a reasonable time frame (say a few weeks but not months), the Verifier may not pursue formal analysis of their draft.</t>
      </section>
    </section>
    <section anchor="proposed-solutions">
      <name>Proposed solutions</name>
      <t>In addition to those mentioned inline in the previous section, we propose the following:</t>
      <section anchor="sec-contact-fatt">
        <name>Contacting FATT: Separate List for FATT and WG members</name>
        <t>We propose creating a public mailing list (something like tls-fatt) for discussions between interested WG members and FATT.</t>
        <t>In our understanding, the idea -- in a nutshell -- is something like <strong>hybrid</strong> design team, i.e.,:</t>
        <ul spacing="normal">
          <li>
            <t>FATT continues to use whatever they currently use for their internal communication ("closed")</t>
          </li>
          <li>
            <t>The proposed list additionally allows public FATT-WG engagement ("open") for questions and discussion of WG members or FATT</t>
          </li>
        </ul>
        <section anchor="potential-need-of-fatt-wg-engagement">
          <name>Potential need of FATT-WG engagement</name>
          <t>In addition to the questions from the WG for the FATT, FATT also needs to engage with the WG:</t>
          <ul spacing="normal">
            <li>
              <t>At <strong>initial</strong> FATT review (just after adoption), FATT may have questions from authors as well as Verifiers. For the former, to understand better the threat model and desired security goals, etc. to be able to suggest which approach is best-suited. For the latter, to better understand what formal analysis approach and tool is being planned/currently used (if any).</t>
            </li>
            <li>
              <t>During <strong>final</strong> FATT review (just before WGLC), FATT may have questions on what the Verifier has done, especially in cases where a peer-reviewed publication is not yet available. We believe evaluating someone else's code is not easy, or at least if FATT has the opportunity to talk to the Verifier, it will decrease the brain cycles that they will have to spend on it.</t>
            </li>
          </ul>
        </section>
        <section anchor="design-goals">
          <name>Design goals</name>
          <ul spacing="normal">
            <li>
              <t><strong>minimal process change</strong>: some private discussions typically happen between authors and FATT; move them to public list for transparency. Keep intra-FATT communication private as it is.</t>
            </li>
            <li>
              <t><strong>balanced workload</strong>: not to increase anyone's workload on average over a finite period of time (say lifetime of one document): joining list is voluntary; responding to list questions is voluntary</t>
            </li>
            <li>
              <t><strong>all stakeholders benefit</strong>: ensure all stakeholders (FATT, authors, WG members, chairs) benefit compared to current process</t>
            </li>
          </ul>
        </section>
        <section anchor="benefits">
          <name>Benefits</name>
          <t>In addition to transparency where this removes the current situation where only the authors have an exclusive access to FATT, we think the proposal has merits where all stakeholders benefit:</t>
          <ul spacing="normal">
            <li>
              <t><strong>Chairs</strong> get relief from carrying messages back and forth between WG and FATT.</t>
            </li>
            <li>
              <t><strong>FATT</strong> gets involved early in the process and has to do lesser work later on (e.g., checking artifacts before WGLC).</t>
            </li>
            <li>
              <t><strong>Interested WG members</strong> get a direct contact with experts.</t>
            </li>
            <li>
              <t><strong>Uninterested WG members</strong> get lesser noise on TLS list. They can check the public archives by searching for a specific draft if they would like to.</t>
            </li>
          </ul>
        </section>
        <section anchor="risks">
          <name>Risks</name>
          <ul spacing="normal">
            <li>
              <t>We acknowledge the risk of '<strong>no response from FATT</strong>' identified on list. In such cases, WG can continue with its best judgement based on its understanding of the available literature.</t>
            </li>
          </ul>
        </section>
        <section anchor="open-questions">
          <name>Open questions</name>
          <t>Opinion of FATT is critical in this proposal whether the middle ground of hybrid is acceptable to (some of) them.</t>
        </section>
      </section>
      <section anchor="sec-sol-ml-kem">
        <name>ML-KEM: FATT review</name>
        <t>We have formally requested the chairs to initiate the FATT process for <xref target="I-D.ietf-tls-mlkem"/>.
See <eref target="https://mailarchive.ietf.org/arch/msg/tls/rClgrWm2hnhESXHx56U8InbwQQs/">this</eref> and <eref target="https://mailarchive.ietf.org/arch/msg/tls/7lj6fYAweMBwNMxFerNl7xhY0pk/">this</eref>.</t>
        <t>We believe formal methods can provide additional value for security considerations of this draft in order to maintain the high cryptographic assurance of TLS.</t>
        <ul spacing="normal">
          <li>
            <t>As an example, it can help justify design choices, such as the preference for hybrids.
It can also help identify ways in which ML-KEM can break.</t>
          </li>
          <li>
            <t>As a relevant data point in the context of standardization, LAKE WG has done formal analysis for EDHOC-PSK with KEM (<eref target="https://mailarchive.ietf.org/arch/msg/lake/2XGOI9OCwylJUfSCasvvwM2FXmw/">ref</eref>).</t>
          </li>
        </ul>
      </section>
      <section anchor="scope-of-fatt">
        <name>Scope of FATT</name>
        <ul spacing="normal">
          <li>
            <t>Be more explicit on:
            </t>
            <ul spacing="normal">
              <li>
                <t>what is the scope of FATT?</t>
              </li>
              <li>
                <t>what kind of drafts need FATT review and why?
Discussion on this is happening in <eref target="https://github.com/tlswg/tls-fatt/issues/19">issue 19</eref>.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="sec-discuss-meetings">
        <name>Discussion at Meeting</name>
        <artwork><![CDATA[
Formal analysis -- just like any other code development -- is an
iterative process and needs to be progressively discussed with
the WG (and not just authors!) to be able to propose secure
solutions.
]]></artwork>
        <t>So at least some time should be allocated in the meetings for discussion of formal analysis.</t>
        <t>If the authors are doing the formal analysis themselves, it would be helpful to also present the current state of formal analysis in meetings for discussion. This may be a single slide describing:</t>
        <ul spacing="normal">
          <li>
            <t>Approach used: symbolic or computational</t>
          </li>
          <li>
            <t>Tool used: ProVerif, CryptoVerif etc.</t>
          </li>
          <li>
            <t>Properties established</t>
          </li>
        </ul>
        <t>This will help the WG give any feedback and avoid other Verifiers doing redundant effort using potentially same tools.</t>
      </section>
    </section>
    <section anchor="sec-res-authors">
      <name>Contribution of Authors</name>
      <t>The following contributions are expected from the authors:</t>
      <section anchor="real-motivation">
        <name>Real Motivation</name>
        <t>Authors are expected to provide the real motivation of the work (i.e., the proposed extension of TLS).
The Verifier can then ask questions to improve it.</t>
      </section>
      <section anchor="sec-th-model">
        <name>Threat Model</name>
        <t>A threat model identifies which threats are in scope for the protocol design. So it should answer questions like:</t>
        <ul spacing="normal">
          <li>
            <t>What are the capabilities of the adversary? What can the adversary do?</t>
          </li>
          <li>
            <t>Whether post-quantum threats are in scope?</t>
          </li>
          <li>
            <t>What can go wrong in the system? etc.</t>
          </li>
        </ul>
        <section anchor="typical-dolev-yao-adversary">
          <name>Typical Dolev-Yao adversary</name>
          <t>A typical threat model assumes the classical Dolev-Yao adversary, who has full control over the communication channel.</t>
          <t>Any additional adversary capabilities and assumptions must be explicitly stated.</t>
        </section>
        <section anchor="potential-weaknesses-of-cryptographic-primitives">
          <name>Potential Weaknesses of Cryptographic Primitives</name>
          <t>In general, it also outlines the potential weaknesses of the cryptographic primitives used in the proposed protocol extension. Examples include:</t>
          <ul spacing="normal">
            <li>
              <t>weak hash functions</t>
            </li>
            <li>
              <t>weak Diffie-Hellman (DH) groups</t>
            </li>
            <li>
              <t>weak elements within strong DH groups</t>
            </li>
          </ul>
        </section>
        <section anchor="keys">
          <name>Keys</name>
          <t>This section should specify any keys in the system (e.g., long-term keys of the server) in addition to the standard TLS key schedule. Theoretically and arguably practically, any key may be compromised (i.e., become available to the adversary).</t>
          <t>For readability, we propose defining each key clearly as in Section 4.1 of <xref target="ID-Crisis"/>. Alternatively, present as a table with the following entries for each key:</t>
          <ul spacing="normal">
            <li>
              <t>Name (or symbol) of the key</t>
            </li>
            <li>
              <t>Purpose of the key</t>
            </li>
            <li>
              <t>(optionally but preferably -- particularly when the endpoint is not fully trusted) Which software in the system has access to the key?</t>
            </li>
          </ul>
          <t>If more than one servers are involved (such as migration cases), the keys for servers should be distinguished in an unambiguous way.</t>
        </section>
      </section>
      <section anchor="informal-security-goals">
        <name>Informal Security Goals</name>
        <t>Knowing what you want is the first step toward achieving it. Hence, informal security goals such as integrity, authentication, freshness, etc. should be outlined in the Internet-Draft.
If the informal security goals are not spelled out in the Internet-Draft, it is safe to assume that the goals are still unclear to the authors.</t>
        <t>Examples:</t>
        <ul spacing="normal">
          <li>
            <t>Integrity of message X holds unless some key Y is leaked.</t>
          </li>
          <li>
            <t>(stated differently) Integrity of message X holds as long as some key Y is protected.</t>
          </li>
          <li>
            <t>Freshness of message X holds unless some key Y or some key Z is leaked.</t>
          </li>
          <li>
            <t>Server Authentication holds unless some key Y or some key Z is leaked.</t>
          </li>
        </ul>
        <t>See Section 5.1 of <xref target="ID-Crisis"/> for concrete examples.</t>
      </section>
      <section anchor="protocol-diagram">
        <name>Protocol Diagram</name>
        <t>A Protocol Diagram should clearly mention the initial knowledge of the protocol participants, e.g., which authentic public keys are known to the protocol participants at the start of the protocol. An example of a Protocol Diagram for <xref target="I-D.fossati-tls-attestation-08"/> is provided in Figure 5 in <xref target="ID-Crisis"/>.</t>
      </section>
    </section>
    <section anchor="document-structure">
      <name>Document Structure</name>
      <t>While the needs may differ for some drafts, we propose the following baseline template, with an example of <xref target="I-D.wang-tls-service-affinity"/>:</t>
      <t>The template is:</t>
      <ul spacing="normal">
        <li>
          <t>Easy for readers</t>
        </li>
        <li>
          <t>Easy for reviewers</t>
        </li>
        <li>
          <t>Easy for formal analysis</t>
        </li>
      </ul>
      <t>TODO: Currently it is almost a copy of the <eref target="https://mailarchive.ietf.org/arch/msg/tls/LfIHs1OVwDKWmDuCEx0p8wP-KPs/">guidance email</eref> to the authors. We will add details in next versions.</t>
      <section anchor="introduction-1">
        <name>Introduction</name>
        <ul spacing="normal">
          <li>
            <t>Problem statement: Say in general what the problem is.</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, we believe this
 should <em>not</em> include CATS. Anyone unfamiliar with CATS should be
 able to understand your problem.</t>
          </li>
        </ul>
      </section>
      <section anchor="terminology">
        <name>Terminology</name>
        <ul spacing="normal">
          <li>
            <t>Define any terms not defined in RFC8446bis or point to other drafts from where the definition is used.</t>
          </li>
        </ul>
      </section>
      <section anchor="motivation-and-design-rationale">
        <name>Motivation and design rationale</name>
        <ul spacing="normal">
          <li>
            <t>We really like how Russ motivates the problem statement in <xref target="I-D.ietf-tls-8773bis"/>. Use it as a sample.</t>
          </li>
          <li>
            <t>Here authors should address all the concerns from WG, including
 justification with compelling arguments and authentic references
 why authors think it should be done within TLS WG (and within handshake).</t>
          </li>
          <li>
            <t>For <xref target="I-D.wang-tls-service-affinity"/>, authors could put CATS here as a motivational use case.</t>
          </li>
        </ul>
      </section>
      <section anchor="proposed-solution-one-or-more-sections">
        <name>Proposed solution (one or more sections)</name>
        <ul spacing="normal">
          <li>
            <t>Protocol design with Protocol Diagram: we work on the formal analysis of TLS 1.3 exclusively. Please contact someone else if your draft relates to older versions.</t>
          </li>
        </ul>
      </section>
      <section anchor="security-considerations">
        <name>Security considerations</name>
        <section anchor="threat-model">
          <name>Threat model</name>
        </section>
        <section anchor="desired-security-goals">
          <name>Desired security goals</name>
          <t>As draft proceeds these desired security goals will become what the draft actually achieves.</t>
        </section>
        <section anchor="other-security-implicationsconsiderations">
          <name>Other security implications/considerations</name>
        </section>
      </section>
    </section>
    <section anchor="sec-res-verifier">
      <name>Contribution of Verifier</name>
      <t>When the authors declare the version as ready for formal analysis, the Verifier takes the above inputs, performs the formal analysis, and brings the results back to the authors and the WG. Based on the analysis, the verifier may propose updates to the Security Considerations section or other sections of the Internet-Draft.</t>
    </section>
    <section anchor="sec-sec-cons">
      <name>Security Considerations</name>
      <t>The whole document is about improving security considerations.</t>
      <t>Like all security proofs, formal analysis is only as strong as its assumptions and model. The scope is typically limited, and the model does not necessarily capture real-world deployment complexity, implementation details, operational constraints, or misuse scenarios. Formal methods should be used as complementary and not as subtitute of other analysis methods.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS-FATT" target="https://github.com/tlswg/tls-fatt">
          <front>
            <title>TLS FATT Process</title>
            <author>
              <organization>IETF TLS WG</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation-08">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="RFC4101">
          <front>
            <title>Writing Protocol Models</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author>
              <organization abbrev="IAB">Internet Architecture Board</organization>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>The IETF process depends on peer review. However, IETF documents are generally written to be useful for implementors, not reviewers. In particular, while great care is generally taken to provide a complete description of the state machines and bits on the wire, this level of detail tends to get in the way of initial understanding. This document describes an approach for providing protocol "models" that allow reviewers to quickly grasp the essence of a system. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4101"/>
          <seriesInfo name="DOI" value="10.17487/RFC4101"/>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-8773bis">
          <front>
            <title>TLS 1.3 Extension for Using Certificates with an External Pre-Shared Key</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date day="5" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS 1.3 extension that allows TLS clients
   and servers to authenticate with certificates and provide
   confidentiality based on encryption with a symmetric key from the
   usual key agreement algorithm and an external pre-shared key (PSK).
   This Standards Track RFC (once approved) obsoletes RFC 8773, which
   was an Experimental RFC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-8773bis-13"/>
        </reference>
        <reference anchor="I-D.fossati-seat-early-attestation-00">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="9" month="January" year="2026"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using remote attestation
   which is a process by which an entity produces Evidence about itself
   that another party can use to appraise whether that entity is found
   in a secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enable the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation Evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and to use them mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-seat-early-attestation-00"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mlkem">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as
   NamedGroups and and registers IANA values in the TLS Supported Groups
   registry for use in TLS 1.3 to achieve post-quantum (PQ) key
   establishment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-07"/>
        </reference>
        <reference anchor="I-D.wang-tls-service-affinity">
          <front>
            <title>Service Affinity Solution based on Transport Layer Security (TLS)</title>
            <author fullname="Wei Wang" initials="W." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Aijun Wang" initials="A." surname="Wang">
              <organization>China Telecom</organization>
            </author>
            <author fullname="Mohit Sahni" initials="M." surname="Sahni">
              <organization>Palo Alto Networks</organization>
            </author>
            <author fullname="Ketul Sheth" initials="K." surname="Sheth">
              <organization>Palo Alto Networks</organization>
            </author>
            <date day="8" month="April" year="2026"/>
            <abstract>
              <t>   This draft proposes a service affinity solution between client and
   server based on Transport Layer Security (TLS).  An extension to
   Transport Layer Security (TLS) 1.3 to enable session migration.  This
   mechanism is designed for network architectures, particularly for
   multi-homed servers that possess multiple network interfaces and IP
   addresses.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wang-tls-service-affinity-01"/>
        </reference>
        <reference anchor="RFC2418">
          <front>
            <title>IETF Working Group Guidelines and Procedures</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="September" year="1998"/>
            <abstract>
              <t>This document describes the guidelines and procedures for formation and operation of IETF working groups. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="25"/>
          <seriesInfo name="RFC" value="2418"/>
          <seriesInfo name="DOI" value="10.17487/RFC2418"/>
        </reference>
      </references>
    </references>
    <?line 456?>

<section numbered="false" anchor="appendix">
      <name>Appendix</name>
      <section numbered="false" anchor="document-history">
        <name>Document History</name>
        <t>-06</t>
        <ul spacing="normal">
          <li>
            <t>Solution for ML-KEM: FATT analysis</t>
          </li>
          <li>
            <t>Solution for FATT contact: new mailing list</t>
          </li>
          <li>
            <t>Replaced responsibilities by expected contributions</t>
          </li>
          <li>
            <t>Clarified Verifier even further that it is just a WG member; no formal role</t>
          </li>
          <li>
            <t>s/pure/non-hybrid</t>
          </li>
        </ul>
        <t>-05</t>
        <ul spacing="normal">
          <li>
            <t>Removed process-related stuff</t>
          </li>
          <li>
            <t>Moved discussion at meeting to solutions</t>
          </li>
          <li>
            <t>Added ML-KEM</t>
          </li>
        </ul>
        <t>-04</t>
        <ul spacing="normal">
          <li>
            <t>Extended threat model <xref target="sec-th-model"/></t>
          </li>
          <li>
            <t>Helpful discussions on formal analysis in meetings in <xref target="sec-discuss-meetings"/></t>
          </li>
          <li>
            <t>Pointer to formal analysis and costs in <xref target="sec-ml-kem"/></t>
          </li>
        </ul>
        <t>-03</t>
        <ul spacing="normal">
          <li>
            <t>Limitations of formal analysis in security considerations</t>
          </li>
          <li>
            <t>Proposed solutions section</t>
          </li>
          <li>
            <t>More guidance for authors: Threat Model and Informal Security Goals</t>
          </li>
        </ul>
        <t>-02</t>
        <ul spacing="normal">
          <li>
            <t>Added document structure</t>
          </li>
          <li>
            <t>FATT-bypass by Other TLS-related WGs</t>
          </li>
          <li>
            <t>FATT process not being followed</t>
          </li>
        </ul>
        <t>-01</t>
        <ul spacing="normal">
          <li>
            <t>Pain points of Verifier <xref target="sec-prot-diagram"/></t>
          </li>
          <li>
            <t>Small adjustment of phrasing</t>
          </li>
        </ul>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thankfully acknowledge the following for their valuable input:</t>
      <ul spacing="normal">
        <li>
          <t>Eric Rescorla for review of -02 and -05. Not all the feedback has yet been applied.</t>
        </li>
        <li>
          <t>John Mattsson for proposing text for security considerations.</t>
        </li>
        <li>
          <t>S. Moonesamy for identifying the 'no response' risk in the proposal for new list.</t>
        </li>
      </ul>
      <t>The research work is funded by German Research Foundation ("Deutsche Forschungsgemeinschaft.")</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
