<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-seat-intra-vs-post-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Intra-vs-post">Pre-, Intra- and Post-handshake Attestation</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-seat-intra-vs-post-01"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="January" day="17"/>
    <area>Security</area>
    <workgroup>Secure Evidence and Attestation Transport</workgroup>
    <keyword>remote attestation</keyword>
    <keyword>TLS 1.3</keyword>
    <keyword>attested TLS</keyword>
    <abstract>
      <?line 141?>

<t>This document presents a taxonomy of extending TLS protocol with remote attestation,
referred to as attested TLS. It also presents high-level analysis of benefits and limitations of each
category, namely pre-handshake attestation, intra-handshake attestation and post-handshake attestation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/seat-intra-vs-post/draft-usama-seat-intra-vs-post.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-seat-intra-vs-post/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Evidence and Attestation Transport Working Group mailing list (<eref target="mailto:seat@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/seat"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/seat/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/seat-intra-vs-post"/>.</t>
    </note>
  </front>
  <middle>
    <?line 148?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Based on our extensive analysis of attested TLS <xref target="Tech-Concepts"/>,
we classify attested TLS into three main categories:</t>
      <ul spacing="normal">
        <li>
          <t>pre-handshake attestation,</t>
        </li>
        <li>
          <t>intra-handshake attestation, and</t>
        </li>
        <li>
          <t>post-handshake attestation.</t>
        </li>
      </ul>
      <t>In pre-handshake attestation, the signing of Claims <xref target="Tech-Concepts"/> precedes the
TLS handshake, while post-handshake attestation applies the reverse.
Intra-handshake attestation requires the signing of Claims to
be done within the TLS handshake protocol.</t>
      <section anchor="scope">
        <name>Scope</name>
        <t>In this version, we analyze the three categories (without combinations) with a focus on the last two, i.e., intra-handshake attestation and post-handshake attestation.</t>
        <t>The current scope of this draft is existing specifications and real-world implementations pointed in the
given references. Any theoretical solutions are currently out of scope until some specification or
implementation emerges.</t>
        <t>For simplicity, we consider simple Attester with only one Attesting Environment and only one Target
Environment <xref target="RFC9334"/>. That is, complicated scenarios such as Composite Device
<xref target="RFC9334"/> etc. are out of scope in this version.</t>
        <t>From RATS perspective, we consider Background Check Model <xref target="RFC9334"/>. Future versions will add
Passport Model <xref target="RFC9334"/>.</t>
        <t>From TLS perspective, the scope is limited to TLS 1.3 as per <xref target="SEAT-Charter"/>.
That is, older versions of TLS are explicitly out of scope.</t>
      </section>
      <section anchor="note">
        <name>Note</name>
        <t>Regarding remote attestation, we note that:</t>
        <blockquote>
          <t>Remote attestation provides guarantees about the state of
Attester <strong>only</strong> at the time at which signing of Claims
is done to generate Evidence <xref target="Tech-Concepts"/>.</t>
        </blockquote>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>We use terminology from <xref target="RFC9334"/> and <xref target="I-D.ietf-tls-rfc8446bis"/> slightly loosely (intentionally)
for readability. Future versions will tighten it.</t>
      <t>In addition, we define three temporal terms:</t>
      <ul spacing="normal">
        <li>
          <t><strong>Evidence Generation Time</strong>: Time when Evidence is generated (more specifically when Claims are signed)</t>
        </li>
        <li>
          <t><strong>Connection Establishment Time</strong>: Time at which TLS handshake is performed</t>
        </li>
        <li>
          <t><strong>Lifetime of Connection</strong>: Time period starting from Evidence Generation Time until the connection exists.</t>
        </li>
      </ul>
    </section>
    <section anchor="pre-handshake-attestation">
      <name>Pre-handshake Attestation</name>
      <t>Since the Evidence Generation Time could be at any
arbitrary point of time in the past compared to the connection
establishment time, pre-handshake attestation provides no guarantees about the state of Attester
at the Evidence Generation Time and during the Lifetime of Connection.</t>
    </section>
    <section anchor="intra-handshake-attestation">
      <name>Intra-handshake Attestation</name>
      <t>Intra-handshake attestation improves the situation where Evidence Generation Time
is the same as Connection Establishment Time.</t>
      <t>In following subsections, we present the benefits and limitations of intra-handshake attestation.</t>
      <section anchor="benefits">
        <name>Benefits</name>
        <section anchor="sec-intra-app-changes">
          <name>No Additional Application-Level Protocol</name>
          <t>Intra-handshake attestation does not require a new application-layer protocol or message exchange.
Evidence and related metadata are conveyed within handshake via TLS extensions.
TLS is responsible for conveyance of the Evidence; it does not perform appraisal of Evidence or authorization.
Appraisal of Evidence, policy evaluation, and trust decisions are performed by application-level components that
consume the attestation properties exposed by the TLS stack. As a result, while no new application-layer protocol
is required, applications do incorporate additional trust logic to interpret attested connection properties
and make security-relevant decisions.</t>
        </section>
        <section anchor="avoid-extra-round-trips-for-one-time-attestation">
          <name>Avoid Extra Round Trips for One-time Attestation</name>
          <t>It is claimed that intra-handshake attestation avoids extra round trips
for use cases which require remote attestation only once
during Connection Establishment Time.</t>
          <t>However, this may only be valid in cases when the Connection Establishment
Time without remote attestation is significantly higher than the time
for generation and appraisal of Evidence.
For instance, Markus Rudy shares his practical experience <xref target="Markus-16Jan"/>:</t>
          <blockquote>
            <t>I don't think saving extra roundtrips is an appropriate design
goal when attestation is required. Generating evidence alone takes
much longer than normal network roundtrip times, not even speaking
of verification.</t>
          </blockquote>
          <t>Our experiments also support his practical experience. In our experience,
the generation of Evidence for Infineon Optiga SLB 9670,
a discrete hardware TPM (dTPM) implementing TPM 2.0, takes around 210 ms.
In our experience, the generation of Evidence for AMD SEV-SNP takes around
6 ms.</t>
        </section>
      </section>
      <section anchor="limitations">
        <name>Limitations</name>
        <section anchor="limited-claims-availability">
          <name>Limited Claims Availability</name>
          <t>Since limited Claims are available at the Evidence Generation Time, it does not provide
complete security posture of the Attester, such as runtime integrity of Attester.</t>
        </section>
        <section anchor="invasive-changes-in-tls">
          <name>Invasive Changes in TLS</name>
          <t>To be made secure, it requires invasive changes in TLS protocol, as deep as key
schedule and adding or modifying existing handshake messages <xref target="ID-Crisis"/>.</t>
        </section>
        <section anchor="state-after-connection-establishment-not-covered">
          <name>State After Connection Establishment Not Covered</name>
          <t>It provides no guarantees about the state of Attester during the lifetime
of connection. This is a security concern in long-lived connections where
state of Attester may change after Connection Establishment Time. Note that session
resumption is a new connection <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
        </section>
        <section anchor="high-handshake-latency">
          <name>High Handshake Latency</name>
          <t>Because of signature in Evidence generation and verification of signatures during appraisal,
this leads to high handshake latency. This may not be desirable for some applications.</t>
          <t>Markus Rudy shares his practical experience <xref target="Markus-16Jan"/>:</t>
          <blockquote>
            <t>Conveying the evidence is not enough, it needs to be verified as well
in order to end up with a trustworthy channel. We decided to integrate
verification into the handshake, too, but that has massive drawbacks:
Verification can take orders of magnitude longer than normal TLS handshakes,
and usually involves remote calls, affecting all sorts of timeouts.
However, doing the verification at the application level would require
forwarding information from the handshake (e.g. nonce), at which point
the application needs to be fully aware of the handshake protocol in
order to verify it, breaking the intended layering.</t>
          </blockquote>
        </section>
        <section anchor="maturity-of-tees">
          <name>Maturity of TEEs</name>
          <t>With several attacks (see <xref target="sec-sec-cons"/>), attestation in
TEEs may not yet be mature enough to be integrated <em>within</em> TLS handshake.</t>
          <t>Ayoub Benaissa remarks <xref target="Ayoub-16Jan"/>:</t>
          <blockquote>
            <t>TLS might not be well suited to include this in its protocol. Not sure
TEEs are even as mature for the people to see that it should be included
right now. The plan to make it a post-handshake protocol makes more sense
right now. A future where it's incorporated into TLS might exist, but I
don't think there is enough motivation right now.</t>
          </blockquote>
        </section>
        <section anchor="amount-of-effort">
          <name>Amount of Effort</name>
          <t>Markus Rudy shares his practical experience <xref target="Markus-16Jan"/>:</t>
          <blockquote>
            <t>"Keeping attestation out of the application logic" is not as straightforward
as it sounds. In the background-check model, the attester needs to collect
evidence in response to the relying party's challenge (nonce). We were
lucky that the Golang TLS stack can be supplied with arbitrary closures
that are called during the handshake, but in my experience this is a rare
design choice and may also be difficult to implement in other languages.</t>
          </blockquote>
          <t>Ayoub Benaissa remarks <xref target="Ayoub-16Jan"/>:</t>
          <blockquote>
            <t>An intra-handshake requires much more work compared to a post-handshake.
People need to agree on how to add this as optional in TLS (we can't force
everyone to use it of course), the standard needs to be implemented by
major libraries, and then it will be available in major client/server
applications. If any of the prior steps doesn't go through, it means you
have to patch your components to make it work, which is not convenient /
less secure.</t>
          </blockquote>
        </section>
        <section anchor="difficulty-of-debugging-attestation">
          <name>Difficulty of Debugging Attestation</name>
          <t>Markus Rudy shares his practical experience <xref target="Markus-16Jan"/>:</t>
          <blockquote>
            <t>There's only so much information in a TLS alert message, and it's
definitely not enough to understand remote verification failures.
While I understand this to be a deliberate design choice by TLS,
I found this to be a hindrance for operating and debugging a large
number of services in practice.</t>
          </blockquote>
        </section>
      </section>
    </section>
    <section anchor="post-handshake-attestation">
      <name>Post-handshake Attestation</name>
      <t>Post-handshake attestation improves the situation further by signing the Claims
during Lifetime of Connection, i.e., at the time when it is actually required.
Hence, together with use cases requiring one-time attestation, it covers the use cases of
long-lived connections requiring re-attestation.
For post-handshake attestation, first round of remote attestation <bcp14>MUST</bcp14> be done
immediately after Connection Establishment Time, and Relying Party (RP)
<xref target="RFC9334"/> <bcp14>MUST</bcp14> not send any secure data until Evidence is successfully appraised.</t>
      <t>In following subsections, we present the benefits and limitations of post-handshake attestation.</t>
      <section anchor="benefits-1">
        <name>Benefits</name>
        <t>In general, it allows re-authentication and re-attestation without tearing down the connection.</t>
        <section anchor="full-claims-availability">
          <name>Full Claims Availability</name>
          <t>Since all Claims are available at the time of post-handshake attestation (during
Lifetime of Connection), it provides complete security posture of the Attester.</t>
        </section>
        <section anchor="no-change-in-tls">
          <name>No Change in TLS</name>
          <t>It does not require any change in TLS protocol.</t>
        </section>
        <section anchor="state-after-connection-establishment-is-covered">
          <name>State After Connection Establishment Is Covered</name>
          <t>It provides guarantees about the state of Attester during the Lifetime of Connection.
This is particularly helpful in long-lived connections where
state of Attester may change after Connection Establishment Time.</t>
        </section>
        <section anchor="standard-handshake-latency">
          <name>Standard Handshake Latency</name>
          <t>Since the signature in Evidence generation and verification of signatures during appraisal
happen after Connection Establishment Time, there is no additional latency.</t>
        </section>
        <section anchor="avoid-extra-round-trips">
          <name>Avoid Extra Round Trips</name>
          <t>Except for first round of remote attestation, post-handshake attestation outperforms the
intra-handshake attestation (one round trip), which requires re-establishing the connection
(1.5 round trip).</t>
        </section>
        <section anchor="ease-of-implementation">
          <name>Ease of Implementation</name>
          <t>Ayoub Benaissa remarks <xref target="Ayoub-16Jan"/>:</t>
          <blockquote>
            <t>We already implemented a post-handshake protocol and have a full demo
working. We were able to do this in a matter of weeks. That's because you
don't need to modify any TLS implementation, but only add a few
verification steps after the usual TLS handshake. This is almost the same
on the client and server side.</t>
          </blockquote>
        </section>
        <section anchor="ease-of-verification-and-audit">
          <name>Ease of Verification and Audit</name>
          <t>Post-handshake attestation has relatively easier formal analysis and
verification. The same may apply to audit.</t>
          <t>Markus Rudy remarks <xref target="Markus-16Jan"/>:</t>
          <blockquote>
            <t>(Formal) verification of a protocol and audit of its implementations
might be much easier if it ran on top of TLS. Existing proofs and
certifications would not need to be reevaluated.</t>
          </blockquote>
        </section>
        <section anchor="general-solution-for-other-protocols">
          <name>General Solution for Other Protocols</name>
          <t>In post-handshake attestation, design, verification and audit effort
will be one-time and any protocol
(e.g., Noise) which has support for exporters can then use it without
changing each and every protocol.</t>
          <t>Markus Rudy shares this requirement <xref target="Markus-16Jan"/>:</t>
          <blockquote>
            <t>It should be possible to port the general shape of a post-handshake
attested TLS protocol to other protocols that provide secure channels
and session binding (Noise comes to mind).</t>
          </blockquote>
        </section>
      </section>
      <section anchor="limitations-1">
        <name>Limitations</name>
        <section anchor="sec-post-app-changes">
          <name>Impact on Application Layer</name>
          <t>Post-handshake attestation may require changes at the application layer. However, changes at
the application layer do not necessarily imply modifications to application business logic
or data exchange protocols. Attestation-related functionality may be realized via application-level
signalling (Exported Authenticators <xref target="RFC9261"/>) and trust logic, which may be implemented in
intermediary components (e.g., proxies, sidecars, or middleware) on both client and server sides.
These components are responsible for exchanging and appraising attestation evidence and enforcing
trust or authorization decisions before application data is processed. This is analogous to common
production deployments in which TLS termination and certificate handling are performed by a
fronting proxy, while the application itself remains unchanged and resides behind it.</t>
        </section>
      </section>
    </section>
    <section anchor="need-for-post-handshake-attestation">
      <name>Need for Post-handshake Attestation</name>
      <t>We argue that post-handshake attestation is unavoidable (e.g., re-attestation to
track changes after Connection Establishment Time for long-lived connections).
Use cases where pre-handshake attestation and intra-handshake attestation are
insufficient include AI agents/agentic AI <xref target="I-D.jiang-seat-dynamic-attestation"/>.</t>
      <t>Intra-handshake attestation only adds unnecessary complexity which is avoidable.
All use cases of intra-handshake attestation can be covered by post-handshake
attestation (by doing attestation round immediately after Connection Establishment Time)
but not the other way around.</t>
      <section anchor="iot-constraints">
        <name>IoT Constraints</name>
        <t><xref target="SEAT-Charter"/> includes TLS client as RATS Attester. Client could be a low-power IoT device.
There are use cases where periodic
or on-demand attestation is required, such as periodic
attestation for long-lived, low-power IoT devices or in IoT
swarms that need to synchronize software versions before
coordinated operations or after configuration updates.</t>
        <t>Moreover, we note some observations from LAKE WG:</t>
        <t>Michael Richardson shares his insight <xref target="MCR-LAKE"/>:</t>
        <blockquote>
          <t>I have a half-written document on putting EAT into the full BRSKI protocol.
A reason that I stopped is that I realized that doing security posture
evaluation at onboarding time (only) wasn't enough.  It has to be done
regularly.  So having a protocol used at onboarding time and another one
during normal operation meant that the onboarding one would have bugs that
never get fixed, since the code only runs once.</t>
        </blockquote>
        <t>He further shares <xref target="MCR-LAKE2"/>:</t>
        <blockquote>
          <t>My contention, which I think the group agreed with, is that one probably
wants to do continuous assurance, that is, to repeat the remote attestation.</t>
        </blockquote>
        <blockquote>
          <t>Do you want to have two protocols and two code paths? (redundant code in a
constrained device?).  I suggested that <em>maybe</em> the remote attestation should
use it's own /.well-known Path, and that it would just occur after
onboarding, and regularly onwards.  Maybe it's weird to onboard a device only
to kick it out again immediately because it failed remote attestation, but
given continuous assurance, this could happen at any time.</t>
        </blockquote>
        <t>Göran Selander observes <xref target="Goran-LAKE"/>:</t>
        <blockquote>
          <t>Indeed, if the authentication procedure is repeated at a later stage, for
whatever reason, e.g. key rotation, it should be possible to repeat the attestation procedure.</t>
        </blockquote>
      </section>
    </section>
    <section anchor="existing-implementations">
      <name>Existing Implementations</name>
      <section anchor="intra-handshake-attestation-1">
        <name>Intra-handshake Attestation</name>
        <t>Prominent implementations of intra-handshake attestation are all vulnerable to
relay attacks <xref target="RelayAttacks"/>. Some of them are abusing the extensions of TLS, such as
SNI and ALPN, for conveyance of attestation nonce <xref target="RelayAttacks"/>.</t>
      </section>
      <section anchor="post-handshake-attestation-1">
        <name>Post-handshake Attestation</name>
        <t>Google <xref target="Keith-STET-CCC"/>, Microsoft <xref target="Stunes-vTPM-CCC"/>, and SCONE <xref target="SoK-Attestation"/>
are all using post-handshake attestation.</t>
      </section>
    </section>
    <section anchor="sec-sec-cons">
      <name>Security Considerations</name>
      <t>Most of the document is about security considerations. Also,
Security Considerations of <xref target="RFC9334"/> and <xref target="I-D.ietf-tls-rfc8446bis"/> apply. In addition:</t>
      <ul spacing="normal">
        <li>
          <t>Pre-handshake attestation is vulnerable to <strong>replay</strong> <xref target="RA-TLS"/> and <strong>diversion</strong>
            <xref target="ID-Crisis"/> attacks. Moreover, pre-handshake attestation leads to a single point of
failure.</t>
        </li>
        <li>
          <t>Without significant changes to the TLS protocol: Intra-handshake attestation is
vulnerable to <strong>diversion</strong> attacks <xref target="ID-Crisis"/>. We reported these attacks to TLS WG in
February 2025 <xref target="Usama-TLS-26Feb25"/>. A formal proof is available
<xref target="ID-Crisis-Repo"/> for further research and
development. Since reporting to TLS WG, these attacks have been practically
exploited in <eref target="https://tee.fail/">TEE.fail</eref>, <eref target="https://wiretap.fail/">Wiretap.fail</eref>, and <eref target="https://badram.eu/">BadRAM</eref>.
More recently, we found that intra-handshake attestation also does not bind the Evidence
to the application traffic secrets, resulting in <strong>relay</strong> attacks <xref target="RelayAttacks"/>.</t>
        </li>
        <li>
          <t>No attacks on post-handshake attestation are currently known. Post-handshake attestation
avoids replay attacks by using fresh attestation nonce. Moreover, it avoids diversion and relay attacks
by binding the Evidence to the underlying TLS connection, such as using Exported Keying Material (EKM)
<xref target="I-D.ietf-tls-rfc8446bis"/>, as proposed in Section 9.2 of <xref target="ID-Crisis"/>.
<xref target="RFC9261"/> and <xref target="RFC9266"/> provide mechanisms for such bindings. Efforts for a formal proof
of security of post-handshake attestation are ongoing.</t>
        </li>
      </ul>
      <section anchor="exploit-of-sensitive-hardware-level-information">
        <name>Exploit of Sensitive Hardware-level Information</name>
        <t>From the view of the TLS server, post-handshake attestation offers better security
than intra-handshake attestation when the server acts as the Attester. In intra-handshake
attestation, due to the inherent asymmetry of the TLS protocol, a malicious TLS client
could potentially retrieve sensitive hardware-level information from the Evidence <strong>without
the client's trustworthiness (i.e., authentication) first being established by the server</strong>.
This information (e.g., vulnerable firmware version) can be exploited for attacks.
In post-handshake attestation, the server can ask for client authentication and only
send the Evidence after successful client authentication.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="RFC9261">
          <front>
            <title>Exported Authenticators in TLS</title>
            <author fullname="N. Sullivan" initials="N." surname="Sullivan"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document describes a mechanism that builds on Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) and enables peers to provide proof of ownership of an identity, such as an X.509 certificate. This proof can be exported by one peer, transmitted out of band to the other peer, and verified by the receiving peer.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9261"/>
          <seriesInfo name="DOI" value="10.17487/RFC9261"/>
        </reference>
        <reference anchor="RFC9266">
          <front>
            <title>Channel Bindings for TLS 1.3</title>
            <author fullname="S. Whited" initials="S." surname="Whited"/>
            <date month="July" year="2022"/>
            <abstract>
              <t>This document defines a channel binding type, tls-exporter, that is compatible with TLS 1.3 in accordance with RFC 5056, "On the Use of Channel Bindings to Secure Channels". Furthermore, it updates the default channel binding to the new binding for versions of TLS greater than 1.2. This document updates RFCs 5801, 5802, 5929, and 7677.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9266"/>
          <seriesInfo name="DOI" value="10.17487/RFC9266"/>
        </reference>
        <reference anchor="Tech-Concepts" target="https://www.researchgate.net/publication/396199290_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Technical_Concepts">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: Technical Concepts</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="RA-TLS" target="https://www.researchgate.net/publication/385384309_Towards_Validation_of_TLS_13_Formal_Model_and_Vulnerabilities_in_Intel's_RA-TLS_Protocol">
          <front>
            <title>Towards Validation of TLS 1.3 Formal Model and Vulnerabilities in Intel's RA-TLS Protocol</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="A." surname="Niemi">
              <organization/>
            </author>
            <author initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author initials="T." surname="Fossati">
              <organization/>
            </author>
            <date year="2024" month="November"/>
          </front>
        </reference>
        <reference anchor="RelayAttacks" target="https://mailarchive.ietf.org/arch/msg/seat/x3eQxFjQFJLceae6l4_NgXnmsDY/">
          <front>
            <title>Relay Attacks in Intra-handshake Attestation for Confidential Agentic AI Systems</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2026" month="January"/>
          </front>
        </reference>
        <reference anchor="I-D.jiang-seat-dynamic-attestation">
          <front>
            <title>Dynamic Attestation for AI Agent Communication</title>
            <author fullname="Yuning Jiang" initials="Y." surname="Jiang">
         </author>
            <author fullname="Wangdonghui" initials="" surname="Wangdonghui">
         </author>
            <date day="13" month="November" year="2025"/>
            <abstract>
              <t>   This document describes a use case for conveying remote attestation
   information in association with Transport Layer Security (TLS)
   sessions in the context of AI agent communication.  It focuses on
   long-lived secure channel sessions where an AI agent runtime posture,
   covering the platform Trusted Computing Base (TCB), agent manifest
   (models, tools and policies) and committed runtime context, can
   change frequently and unpredictably.  The document highlights
   requirements for dynamic attestation so that relying parties can base
   authorization decisions on the current runtime posture of the
   communicating agent.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-jiang-seat-dynamic-attestation-00"/>
        </reference>
        <reference anchor="SEAT-Charter" target="https://datatracker.ietf.org/wg/seat/about/">
          <front>
            <title>Secure Evidence and Attestation Transport (SEAT): Charter for Working Group</title>
            <author initials="" surname="IETF">
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="MCR-LAKE" target="https://mailarchive.ietf.org/arch/msg/lake/RseQknOug41sTzW7xBJ60oRdvq0/">
          <front>
            <title>Re: Comments for remote attestation over EDHOC</title>
            <author initials="" surname="Michael Richardson">
              <organization/>
            </author>
            <date year="2024" month="May"/>
          </front>
        </reference>
        <reference anchor="MCR-LAKE2" target="https://mailarchive.ietf.org/arch/msg/lake/o2oujiDacHm2m9a5y7W50oUsY7o/">
          <front>
            <title>Evaluation of attestation results by EDHOC clients</title>
            <author initials="" surname="Michael Richardson">
              <organization/>
            </author>
            <date year="2024" month="June"/>
          </front>
        </reference>
        <reference anchor="Goran-LAKE" target="https://mailarchive.ietf.org/arch/msg/lake/Bb3eTcQxDA-F1AYJ0hZZy3p9wpQ/">
          <front>
            <title>Re: Comments for remote attestation over EDHOC</title>
            <author initials="" surname="Göran Selander">
              <organization/>
            </author>
            <date year="2024" month="May"/>
          </front>
        </reference>
        <reference anchor="Keith-STET-CCC" target="https://github.com/CCC-Attestation/meetings/blob/main/materials/KeithMoyer_STET.pdf">
          <front>
            <title>Split-Trust Encryption Tool Attested Session Handling</title>
            <author initials="" surname="Keith Moyer">
              <organization/>
            </author>
            <date year="2022" month="March"/>
          </front>
        </reference>
        <reference anchor="Stunes-vTPM-CCC" target="https://www.youtube.com/watch?v=J7SibeZmQsE">
          <front>
            <title>Azure vTPM Attestation and Binding</title>
            <author initials="" surname="Mike Stunes">
              <organization/>
            </author>
            <date year="2025" month="July"/>
          </front>
        </reference>
        <reference anchor="SoK-Attestation" target="https://www.researchgate.net/publication/367284929_SoK_Attestation_in_Confidential_Computing">
          <front>
            <title>SoK: Attestation in Confidential Computing</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="T." surname="Fossati">
              <organization/>
            </author>
            <author initials="S." surname="Frost">
              <organization/>
            </author>
            <date year="2023" month="January"/>
          </front>
        </reference>
        <reference anchor="Ayoub-16Jan" target="https://mailarchive.ietf.org/arch/msg/seat/8eynK9ky5F-TcnL_UPbSRDKuK1E/">
          <front>
            <title>Re: New Version Notification for draft-usama-seat-intra-vs-post-00.txt</title>
            <author initials="" surname="Ayoub Benaissa">
              <organization/>
            </author>
            <date year="2026" month="January"/>
          </front>
        </reference>
        <reference anchor="Markus-16Jan" target="https://mailarchive.ietf.org/arch/msg/seat/Pxr_12v6MIQIzGFTUdx04aVZYpM/">
          <front>
            <title>Re: New Version Notification for draft-usama-seat-intra-vs-post-00.txt</title>
            <author initials="" surname="Markus Rudy">
              <organization/>
            </author>
            <date year="2026" month="January"/>
          </front>
        </reference>
        <reference anchor="Usama-TLS-26Feb25" target="https://mailarchive.ietf.org/arch/msg/tls/Jx_yPoYWMIKaqXmPsytKZBDq23o/">
          <front>
            <title>Impersonation attacks on protocol in draft-fossati-tls-attestation (Identity crisis in Attested TLS) for Confidential Computing</title>
            <author initials="" surname="Muhammad Usama Sardar">
              <organization/>
            </author>
            <date year="2025" month="February"/>
          </front>
        </reference>
        <reference anchor="ID-Crisis-Repo" target="https://github.com/CCC-Attestation/formal-spec-id-crisis">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal analysis of attested TLS protocols</title>
            <author initials="" surname="Muhammad Usama Sardar">
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
      </references>
    </references>
    <?line 553?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We gratefully thank the following:</t>
      <ul spacing="normal">
        <li>
          <t>Peg Jones for review of early draft before submission</t>
        </li>
        <li>
          <t>Paul Wouters for review of section 4 of -00</t>
        </li>
        <li>
          <t>Ayoub Benaissa for review of -00 and sharing his practical experiences</t>
        </li>
        <li>
          <t>Markus Rudy for review of -00 and sharing his practical experiences</t>
        </li>
      </ul>
    </section>
    <section numbered="false" anchor="contributors">
      <name>Contributors</name>
      <t>Pavel Nikonorov (GENXT / IIAP NAS RA) contributed text in <xref target="sec-intra-app-changes"/> and <xref target="sec-post-app-changes"/>.</t>
    </section>
    <section numbered="false" anchor="history">
      <name>History</name>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Added scope section to address comments of Paul Wouters</t>
        </li>
        <li>
          <t>Added comments of Ayoub Benaissa as quotes</t>
        </li>
        <li>
          <t>Added some subsections to incorporate practical experiences of Markus Rudy</t>
        </li>
        <li>
          <t>Extended security considerations</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
