<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-fatt-extension-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title>Extensions to TLS FATT Process</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-fatt-extension-00"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2025" month="July" day="07"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 51?>

<t>This document proposes a new "Formal Analysis Considerations" section where the authors provide a threat model, informal security goals, and a protocol diagram.
This document applies only to non-trivial extensions of TLS, which require formal analysis.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/tls-fatt-extension/draft-usama-tls-fatt-extension.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-fatt-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/tls-fatt-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While the TLS FATT process <xref target="TLS-FATT"/> marks a historic change in achieving high cryptographic assurances by tightly integrating formal methods in the working group process, the current FATT process has some practical limitations. Given a relatively smaller formal methods community, and a steep learning curve as well as very low consideration of usability in the existing formal analysis tools, this document proposes some solutions to make the FATT process sustainable.</t>
      <t>Specifically, the TLS FATT process does not outline the division of responsibility between the authors and the one doing the formal analysis (the latter is hereafter referred to as the "verifier"). This document aims to fill this gap without putting an extensive burden on either party.</t>
      <t>An argument is often presented by the authors that an Internet-Draft is written for the implementers. With the FATT process, this argument is no longer valid. This document outlines the corresponding changes in the way Internet-Drafts are typically written. For the Internet-Draft to be useful for the formal analysis, this document proposes a new "Formal Analysis Considerations" section containing three main items, namely:</t>
      <ul spacing="normal">
        <li>
          <t>a threat model,</t>
        </li>
        <li>
          <t>informal security goals, and</t>
        </li>
        <li>
          <t>a protocol diagram (<xref target="sec-prot-diagram"/>).</t>
        </li>
      </ul>
      <t>Each one of these is summarized in <xref target="sec-res-authors"/>. Future versions of this draft will include concrete examples.</t>
      <t>Responsibilities of the verifier are summarized in <xref target="sec-res-verifier"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>A clear separation of resposibilities would help IRTF UFMRG to train the authors and verifiers separately to fulfill their own responsibilities.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="sec-prot-diagram">
        <name>Protocol Diagram</name>
        <t>In the context of this document, a protocol diagram specifies the proposed cryptographically-relevant changes compared to the standard TLS protocol <xref target="I-D.ietf-tls-rfc8446bis"/>. This is conceptually similar to the Protocol Model in <xref target="RFC4101"/>. However, while <xref target="RFC4101"/> only recommends diagrams, we consider diagrams to be essential.</t>
      </section>
      <section anchor="definition-of-attack">
        <name>Definition of Attack</name>
        <t>Any ambiguity originating from the threat model, informal security goals, and a protocol diagram is to be considered as an attack. The authors are, therefore, encouraged to be as precise as possible.</t>
      </section>
    </section>
    <section anchor="sec-res-authors">
      <name>Responsibilities of Authors</name>
      <t>This document proposes a new "Formal Analysis Considerations" section where the authors provide the following three items:</t>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>A threat model outlines the assumptions and known weaknesses of the proposed protocol. The threat model could be the classical Dolev-Yao adversary. In addition, it could specify any keys (e.g., long-term keys or session keys) which are assumed to be compromised (i.e., available to the adversary).</t>
      </section>
      <section anchor="informal-security-goals">
        <name>Informal Security Goals</name>
        <t>Knowing what you want is the first step toward achieving it. Hence, informal security goals such as integrity, authentication, freshness, etc. should be outlined in the Internet-Draft.
If the informal security goals are not spelled out in the Internet-Draft, it is safe to assume that the goals are still unclear to the authors. In such a case, the Internet-Draft should not be considered as ready for adoption.</t>
      </section>
      <section anchor="protocol-diagram">
        <name>Protocol Diagram</name>
        <t>A protocol diagram should clearly mention the initial knowledge of the protocol participants, e.g., which authentic public keys are known to the protocol participants at the start of the protocol. An example of a protocol diagram for <xref target="I-D.fossati-tls-attestation-08"/> is provided in Section 3 of <xref target="Meeting-122-TLS-Slides"/>.</t>
      </section>
    </section>
    <section anchor="sec-res-verifier">
      <name>Responsibilities of Verifier</name>
      <t>When the authors declare the version as ready for formal analysis, the verifier takes the above inputs, performs the formal analysis, and brings the results back to the authors and the working group. Based on the analysis, the verifier may propose updates to the "Formal Analysis Considerations" section, Security Considerations section or other sections of the Internet-Draft.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The whole document is about improving security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="17" month="February" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-12"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation-08">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="RFC4101">
          <front>
            <title>Writing Protocol Models</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author>
              <organization abbrev="IAB">Internet Architecture Board</organization>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>The IETF process depends on peer review. However, IETF documents are generally written to be useful for implementors, not reviewers. In particular, while great care is generally taken to provide a complete description of the state machines and bits on the wire, this level of detail tends to get in the way of initial understanding. This document describes an approach for providing protocol "models" that allow reviewers to quickly grasp the essence of a system. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4101"/>
          <seriesInfo name="DOI" value="10.17487/RFC4101"/>
        </reference>
        <reference anchor="TLS-FATT" target="https://github.com/tlswg/tls-fatt">
          <front>
            <title>TLS FATT Process</title>
            <author>
              <organization>IETF TLS WG</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="Meeting-122-TLS-Slides" target="https://datatracker.ietf.org/meeting/122/materials/slides-122-tls-identity-crisis-00">
          <front>
            <title>Identity Crisis in Attested TLS for Confidential Computing</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 145?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
