<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-seat-intra-vs-post-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="TODO - Abbreviation">Pre-, Intra- and Post-handshake Attestation</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-seat-intra-vs-post-00"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="January" day="14"/>
    <area>Security</area>
    <workgroup>Secure Evidence and Attestation Transport</workgroup>
    <keyword>remote attestation</keyword>
    <keyword>TLS 1.3</keyword>
    <keyword>attested TLS</keyword>
    <abstract>
      <?line 110?>

<t>This document presents a taxonomy of extending TLS protocol with remote attestation,
referred to as attested TLS. It also presents high-level analysis of benefits and limitations of each
category, namely pre-handshake attestation, intra-handshake attestation and post-handshake attestation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/seat-intra-vs-post/draft-usama-seat-intra-vs-post.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-seat-intra-vs-post/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Evidence and Attestation Transport Working Group mailing list (<eref target="mailto:seat@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/seat"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/seat/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/seat-intra-vs-post"/>.</t>
    </note>
  </front>
  <middle>
    <?line 117?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Based on our extensive analysis of attested TLS <xref target="Tech-Concepts"/>,
we classify attested TLS into three main categories:</t>
      <ul spacing="normal">
        <li>
          <t>pre-handshake attestation,</t>
        </li>
        <li>
          <t>intra-handshake attestation, and</t>
        </li>
        <li>
          <t>post-handshake attestation.</t>
        </li>
      </ul>
      <t>In pre-handshake attestation, the signing of Claims <xref target="Tech-Concepts"/> precedes the
TLS handshake, while post-handshake attestation applies the reverse.
Intra-handshake attestation requires the signing of Claims to
be done within the TLS handshake protocol.</t>
      <t>In this version, we analyze the three categories (without combinations) with a focus on the last two.
Regarding remote attestation, we note that:</t>
      <blockquote>
        <t>Remote attestation provides guarantees about the state of
Attester <strong>only</strong> at the time at which signing of Claims
is done to generate Evidence <xref target="Tech-Concepts"/>.</t>
      </blockquote>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>We use terminology from <xref target="RFC9334"/> and <xref target="I-D.ietf-tls-rfc8446bis"/> slightly loosely (intentionally)
for readability. Future versions will tighten it.</t>
      <t>In addition, we define three temporal terms:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Evidence Generation Time</strong>: Time when Evidence is generated (more specifically when Claims are signed)</t>
        </li>
        <li>
          <t><strong>Connection Establishment Time</strong>: Time at which TLS handshake is performed</t>
        </li>
        <li>
          <t><strong>Lifetime of Connection</strong>: Time period starting from Evidence Generation Time until the connection exists.</t>
        </li>
      </ul>
    </section>
    <section anchor="pre-handshake-attestation">
      <name>Pre-handshake Attestation</name>
      <t>Since the Evidence Generation Time could be at any
arbitrary point of time in the past compared to the connection
establishment time, pre-handshake attestation provides no guarantees about the state of Attester
at the Evidence Generation Time and during the Lifetime of Connection.</t>
    </section>
    <section anchor="intra-handshake-attestation">
      <name>Intra-handshake Attestation</name>
      <t>Intra-handshake attestation improves the situation where Evidence Generation Time
is the same as Connection Establishment Time.</t>
      <t>In following subsections, we present the benefits and limitations of intra-handshake attestation.</t>
      <section anchor="benefits">
        <name>Benefits</name>
        <section anchor="sec-intra-app-changes">
          <name>No Additional Application-Level Protocol</name>
          <t>Intra-handshake attestation does not require a new application-layer protocol or message exchange.
Evidence and related metadata are conveyed within handshake via TLS extensions.
TLS is responsible for conveyance of the Evidence; it does not perform appraisal of Evidence or authorization.
Appraisal of Evidence, policy evaluation, and trust decisions are performed by application-level components that
consume the attestation properties exposed by the TLS stack. As a result, while no new application-layer protocol
is required, applications do incorporate additional trust logic to interpret attested connection properties
and make security-relevant decisions.</t>
        </section>
        <section anchor="avoids-extra-round-trips-for-one-time-attestation">
          <name>Avoids Extra Round Trips for One-time Attestation</name>
          <t>It avoids extra round trips for use cases which require remote attestation only once
during Connection Establishment Time.</t>
        </section>
      </section>
      <section anchor="limitations">
        <name>Limitations</name>
        <section anchor="limited-claims-availability">
          <name>Limited Claims Availability</name>
          <t>Since limited Claims are available at the Evidence Generation Time, it does not provide
complete security posture of the Attester, such as runtime integrity of Attester.</t>
        </section>
        <section anchor="invasive-changes-in-tls">
          <name>Invasive Changes in TLS</name>
          <t>To be made secure, it requires invasive changes in TLS protocol, as deep as key
schedule and adding or modifying existing handshake messages <xref target="ID-Crisis"/>.</t>
        </section>
        <section anchor="state-after-connection-establishment-not-covered">
          <name>State After Connection Establishment Not Covered</name>
          <t>It provides no guarantees about the state of Attester during the lifetime
of connection. This is a security concern in long-lived connections where
state of Attester may change after Connection Establishment Time.</t>
        </section>
        <section anchor="high-handshake-latency">
          <name>High Handshake Latency</name>
          <t>Because of signature in Evidence generation and verification of signatures during appraisal,
this leads to high handshake latency. This may not be desirable for some applications.</t>
        </section>
      </section>
    </section>
    <section anchor="post-handshake-attestation">
      <name>Post-handshake Attestation</name>
      <t>Post-handshake attestation improves the situation further by signing the Claims
during Lifetime of Connection, i.e., at the time when it is actually required.
Hence, together with use cases requiring one-time attestation, it covers the use cases of
long-lived connections requiring re-attestation.
For post-handshake attestation, first round of remote attestation <bcp14>MUST</bcp14> be done
immediately after Connection Establishment Time, and Relying Party (RP)
<xref target="RFC9334"/> <bcp14>MUST</bcp14> not send any secure data until Evidence is successfully appraised.</t>
      <t>In following subsections, we present the benefits and limitations of post-handshake attestation.</t>
      <section anchor="benefits-1">
        <name>Benefits</name>
        <t>In general, it allows re-authentication and re-attestation without tearing down the connection.</t>
        <section anchor="full-claims-availability">
          <name>Full Claims Availability</name>
          <t>Since all Claims are available at the time of post-handshake attestation (during
Lifetime of Connection), it provides complete security posture of the Attester.</t>
        </section>
        <section anchor="no-change-in-tls">
          <name>No Change in TLS</name>
          <t>It does not require any change in TLS protocol.</t>
        </section>
        <section anchor="state-after-connection-establishment-is-covered">
          <name>State After Connection Establishment Is Covered</name>
          <t>It provides guarantees about the state of Attester during the Lifetime of Connection.
This is particularly helpful in long-lived connections where
state of Attester may change after Connection Establishment Time.</t>
        </section>
        <section anchor="standard-handshake-latency">
          <name>Standard Handshake Latency</name>
          <t>Since the signature in Evidence generation and verification of signatures during appraisal
happen after Connection Establishment Time, there is no additional latency.</t>
        </section>
        <section anchor="avoids-extra-round-trips">
          <name>Avoids Extra Round Trips</name>
          <t>Except for first round of remote attestation, post-handshake attestation outperforms the
intra-handshake attestation (one round trip), which requires re-establishing the connection
(1.5 round trip).</t>
        </section>
      </section>
      <section anchor="limitations-1">
        <name>Limitations</name>
        <section anchor="sec-post-app-changes">
          <name>Impact on Application Layer</name>
          <t>Post-handshake attestation may require changes at the application layer. However, changes at
the application layer do not necessarily imply modifications to application business logic
or data exchange protocols. Attestation-related functionality may be realized via application-level
signalling (Exported Authenticators <xref target="RFC9261"/>) and trust logic, which may be implemented in
intermediary components (e.g., proxies, sidecars, or middleware) on both client and server sides.
These components are responsible for exchanging and appraising attestation evidence and enforcing
trust or authorization decisions before application data is processed. This is analogous to common
production deployments in which TLS termination and certificate handling are performed by a
fronting proxy, while the application itself remains unchanged and resides behind it.</t>
        </section>
      </section>
    </section>
    <section anchor="need-for-post-handshake-attestation">
      <name>Need for Post-handshake Attestation</name>
      <t>We argue that post-handshake attestation is unavoidable (e.g., re-attestation to
track changes after Connection Establishment Time for long-lived connections).
Use cases where pre-handshake attestation and intra-handshake attestation are
insufficient include include AI agents/agentic AI <xref target="I-D.jiang-seat-dynamic-attestation"/>.</t>
      <t>Intra-handshake attestation only adds unnecessary complexity which is avoidable.
All use cases of intra-handshake attestation can be covered by post-handshake
attestation (by doing attestation round immediately after Connection Establishment Time)
but not the other way around.</t>
      <section anchor="iot-constraints">
        <name>IoT Constraints</name>
        <t><xref target="SEAT-Charter"/> includes TLS client as RATS Attester. Client could be a low-power IoT device.
There are use cases where periodic
or on-demand attestation is required, such as periodic
attestation for long-lived, low-power IoT devices or in IoT
swarms that need to synchronize software versions before
coordinated operations or after configuration updates.</t>
        <t>Moreover, we note some observations from LAKE WG:</t>
        <t>Michael Richardson shares his insight <xref target="MCR-LAKE"/>:</t>
        <blockquote>
          <t>I have a half-written document on putting EAT into the full BRSKI protocol.
A reason that I stopped is that I realized that doing security posture
evaluation at onboarding time (only) wasn't enough.  It has to be done
regularly.  So having a protocol used at onboarding time and another one
during normal operation meant that the onboarding one would have bugs that
never get fixed, since the code only runs once.</t>
        </blockquote>
        <t>Göran Selander observes <xref target="Goran-LAKE"/>:</t>
        <blockquote>
          <t>Indeed, if the authentication procedure is repeated at a later stage, for
whatever reason, e.g. key rotation, it should be possible to repeat the attestation procedure.</t>
        </blockquote>
      </section>
    </section>
    <section anchor="existing-implementations">
      <name>Existing Implementations</name>
      <section anchor="intra-handshake-attestation-1">
        <name>Intra-handshake Attestation</name>
        <t>Prominent implementations of intra-handshake attestation are all vulnerable to
relay attacks <xref target="RelayAttacks"/>. Some of them are abusing the extensions of TLS, such as
SNI and ALPN, for conveyance of attestation nonce <xref target="RelayAttacks"/>.</t>
      </section>
      <section anchor="post-handshake-attestation-1">
        <name>Post-handshake Attestation</name>
        <t>Google <xref target="Keith-STET-CCC"/>, Microsoft <xref target="Stunes-vTPM-CCC"/>, and SCONE <xref target="SoK-Attestation"/>
are all using post-handshake attestation.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Most of the document is about security considerations. Also,
Security Considerations of <xref target="RFC9334"/> and <xref target="I-D.ietf-tls-rfc8446bis"/> apply. In addition:</t>
      <ul spacing="normal">
        <li>
          <t>Pre-handshake attestation is vulnerable to <strong>replay</strong> <xref target="RA-TLS"/> and <strong>diversion</strong>
            <xref target="ID-Crisis"/> attacks.</t>
        </li>
        <li>
          <t>Without significant changes to the TLS protocol: Intra-handshake attestation is
vulnerable to <strong>diversion</strong> attacks <xref target="ID-Crisis"/>. It also does not bind the Evidence
to the application traffic secrets, resulting in <strong>relay</strong> attacks <xref target="RelayAttacks"/>.</t>
        </li>
        <li>
          <t>No attacks on post-handshake attestation are currently known. Post-handshake attestation
avoids replay attacks by using fresh attestation nonce. Moreover, it avoids diversion and relay attacks
by binding the Evidence to the underlying TLS connection, such as using Exported Keying Material (EKM)
<xref target="I-D.ietf-tls-rfc8446bis"/>. <xref target="RFC9261"/> and <xref target="RFC9266"/> provides mechanisms for such bindings.</t>
        </li>
      </ul>
      <section anchor="exploit-of-sensitive-hardware-level-information">
        <name>Exploit of Sensitive Hardware-level Information</name>
        <t>From the view of the TLS server, post-handshake attestation offers better security
than intra-handshake attestation when the server acts as the Attester. In intra-handshake
attestation, due to the inherent asymmetry of the TLS protocol, a malicious TLS client
could potentially retrieve sensitive hardware-level information from the Evidence <strong>without
the client's trustworthiness (i.e., authentication) first being established by the server</strong>.
This information (e.g., vulnerable firmware version) can be exploited for attacks.
In post-handshake attestation, the server can ask for client authentication and only
send the Evidence after successful client authentication.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9261">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC9266">
          <front>
            <title>Channel Bindings for TLS 1.3</title>
            <author fullname="S. Whited" initials="S." surname="Whited"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document defines a channel binding type, tls-exporter, that is compatible with TLS 1.3 in accordance with RFC 5056, "On the Use of Channel Bindings to Secure Channels". Furthermore, it updates the default channel binding to the new binding for versions of TLS greater than 1.2. This document updates RFCs 5801, 5802, 5929, and 7677.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9266"/>
          <seriesInfo name="DOI" value="10.17487/RFC9266"/>
        </reference>
        <reference anchor="Tech-Concepts" target="https://www.researchgate.net/publication/396199290_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Technical_Concepts">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: Technical Concepts</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="RA-TLS" target="https://www.researchgate.net/publication/385384309_Towards_Validation_of_TLS_13_Formal_Model_and_Vulnerabilities_in_Intel's_RA-TLS_Protocol">
          <front>
            <title>Towards Validation of TLS 1.3 Formal Model and Vulnerabilities in Intel's RA-TLS Protocol</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="A." surname="Niemi">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author initials="T." surname="Fossati">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="RelayAttacks" target="https://mailarchive.ietf.org/arch/msg/seat/x3eQxFjQFJLceae6l4_NgXnmsDY/">
          <front>
            <title>Relay Attacks in Intra-handshake Attestation for Confidential Agentic AI Systems</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2026" month="January"/>
          </front>
        </reference>
        <reference anchor="I-D.jiang-seat-dynamic-attestation">
          <front>
            <title>Dynamic Attestation for AI Agent Communication</title>
            <author fullname="Yuning Jiang" initials="Y." surname="Jiang">
         </author>
            <author fullname="Wangdonghui" initials="" surname="Wangdonghui">
         </author>
            <date day="13" month="November" year="2025"/>
            <abstract>
              <t>   This document describes a use case for conveying remote attestation
   information in association with Transport Layer Security (TLS)
   sessions in the context of AI agent communication.  It focuses on
   long-lived secure channel sessions where an AI agent runtime posture,
   covering the platform Trusted Computing Base (TCB), agent manifest
   (models, tools and policies) and committed runtime context, can
   change frequently and unpredictably.  The document highlights
   requirements for dynamic attestation so that relying parties can base
   authorization decisions on the current runtime posture of the
   communicating agent.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-jiang-seat-dynamic-attestation-00"/>
        </reference>
        <reference anchor="SEAT-Charter" target="https://datatracker.ietf.org/wg/seat/about/">
          <front>
            <title>Secure Evidence and Attestation Transport (SEAT): Charter for Working Group</title>
            <author initials="" surname="IETF">
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="MCR-LAKE" target="https://mailarchive.ietf.org/arch/msg/lake/RseQknOug41sTzW7xBJ60oRdvq0/">
          <front>
            <title>Comments for remote attestation over EDHOC</title>
            <author initials="" surname="Michael Richardson">
              <organization/>
            </author>
            <date year="2024" month="May"/>
          </front>
        </reference>
        <reference anchor="Goran-LAKE" target="https://mailarchive.ietf.org/arch/msg/lake/Bb3eTcQxDA-F1AYJ0hZZy3p9wpQ/">
          <front>
            <title>Comments for remote attestation over EDHOC</title>
            <author initials="" surname="Göran Selander">
              <organization/>
            </author>
            <date year="2024" month="May"/>
          </front>
        </reference>
        <reference anchor="Keith-STET-CCC" target="https://github.com/CCC-Attestation/meetings/blob/main/materials/KeithMoyer_STET.pdf">
          <front>
            <title>Split-Trust Encryption Tool Attested Session Handling</title>
            <author initials="" surname="Keith Moyer">
              <organization/>
            </author>
            <date year="2022" month="March"/>
          </front>
        </reference>
        <reference anchor="Stunes-vTPM-CCC" target="https://www.youtube.com/watch?v=J7SibeZmQsE">
          <front>
            <title>Azure vTPM Attestation and Binding</title>
            <author initials="" surname="Mike Stunes">
              <organization/>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="SoK-Attestation" target="https://www.researchgate.net/publication/367284929_SoK_Attestation_in_Confidential_Computing">
          <front>
            <title>SoK: Attestation in Confidential Computing</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="T." surname="Fossati">
              <organization/>
            </author>
            <author initials="S." surname="Frost">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 367?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We gratefully thank Peg Jones for review.</t>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Pavel Nikonorov (GENXT / IIAP NAS RA) contributed text in <xref target="sec-intra-app-changes"/> and <xref target="sec-post-app-changes"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
