<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-tls-fatt-extension-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Extensions to TLS FATT Process</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-tls-fatt-extension-01"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="January" day="07"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 63?>

<t>This document applies only to non-trivial extensions of TLS, which require formal analysis. It proposes the authors provide a threat model and informal security goals in the Security Considerations section, and a protocol diagram in the draft.
We also briefly present a few pain points of the one doing the formal analysis which require refining the process:</t>
      <ul spacing="normal">
        <li>
          <t>Contacting FATT</t>
        </li>
        <li>
          <t>Understanding the opposing goals</t>
        </li>
        <li>
          <t>No response from some authors</t>
        </li>
        <li>
          <t>Slots at meeting</t>
        </li>
      </ul>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/tls-fatt-extension/draft-usama-tls-fatt-extension.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-tls-fatt-extension/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/tls-fatt-extension"/>.</t>
    </note>
  </front>
  <middle>
    <?line 74?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>While the TLS FATT process <xref target="TLS-FATT"/> marks a historic change in achieving high cryptographic assurances by tightly integrating formal methods in the working group (WG) process, the current FATT process has some practical limitations. Given a relatively smaller formal methods community, and a steep learning curve as well as very low consideration of usability in the existing formal analysis tools, this document proposes some solutions to make the FATT process sustainable.</t>
      <t>Specifically, the TLS FATT process does not outline the division of responsibility between the authors and the one doing the formal analysis (the latter is hereafter referred to as the "verifier"). This document aims to propose some solutions without putting an extensive burden on either party.</t>
      <t>An argument is often presented by the authors that an Internet-Draft is written for the implementers. We make several counter-arguments here:</t>
      <ul spacing="normal">
        <li>
          <t>Researchers and protocol designers are also stakeholders of such specifications <xref target="I-D.irtf-cfrg-cryptography-specification"/>.</t>
        </li>
        <li>
          <t>Even implementers may like to understand the security implications before blindly starting to implement it.</t>
        </li>
        <li>
          <t>With the FATT process, this argument is clearly invalid. The verifier may not be the same as the implementer.</t>
        </li>
      </ul>
      <t>This document outlines the corresponding changes in the way Internet-Drafts are typically written. For the Internet-Draft to be useful for the formal analysis, this document proposes that the draft should contain three main items, namely:</t>
      <ul spacing="normal">
        <li>
          <t>a threat model,</t>
        </li>
        <li>
          <t>informal security goals, and</t>
        </li>
        <li>
          <t>a protocol diagram (<xref target="sec-prot-diagram"/>).</t>
        </li>
      </ul>
      <t>Each one of these is summarized in <xref target="sec-res-authors"/>. Future versions of this draft will include concrete examples.</t>
      <t>Responsibilities of the verifier are summarized in <xref target="sec-res-verifier"/>.</t>
      <section anchor="motivation">
        <name>Motivation</name>
        <t>A clear separation of resposibilities would help IRTF UFMRG to train the authors and verifiers separately to fulfill their own responsibilities.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<section anchor="sec-prot-diagram">
        <name>Protocol Diagram</name>
        <t>In the context of this document, a protocol diagram specifies the proposed cryptographically-relevant changes compared to the standard TLS protocol <xref target="I-D.ietf-tls-rfc8446bis"/>. This is conceptually similar to the Protocol Model in <xref target="RFC4101"/>. However, while <xref target="RFC4101"/> only recommends diagrams, we consider diagrams to be essential.</t>
      </section>
      <section anchor="definition-of-attack">
        <name>Definition of Attack</name>
        <t>Any ambiguity originating from the threat model, informal security goals, and a protocol diagram is to be considered as an attack. The authors are, therefore, encouraged to be as precise as possible.</t>
      </section>
      <section anchor="verifier">
        <name>Verifier</name>
        <t>In this document, verifier refers to the person doing the formal analysis.</t>
      </section>
    </section>
    <section anchor="sec-pain-points">
      <name>Pain Points of Verifier</name>
      <t>From the two extremes -- <xref target="I-D.ietf-tls-8773bis"/> where Russ kindly provided all requested inputs and we were able to get it through without any formal analysis to <xref target="I-D.fossati-tls-attestation-08"/> where formal analysis revealed vulnerabilities <xref target="ID-Crisis"/> and resulted in a separate WG to tackle this problem -- we summarize the pain points of the verifier.</t>
      <section anchor="contacting-fatt">
        <name>Contacting FATT</name>
        <t>The verifier should be allowed to contact the FATT at least once some draft is out from the TLS WG. Formal methods community is small and those with deep knowledge of TLS are quite limited. Not being able to contact them puts the verifier at great disadvantage.</t>
      </section>
      <section anchor="understanding-the-opposing-goals">
        <name>Understanding the Opposing Goals</name>
        <t>The authors need to understand that the task of the verifier is to find the subtle corner cases where the protocol may fail. This is naturally opposed to the goal of the authors.
But unless the verifier remains really focused on doing that, there is little value of formal analysis.
In particular, some topics like remote attestation need more precise specifications because small changes may make a big difference.</t>
      </section>
      <section anchor="no-response-from-some-authors">
        <name>No Response from Some Authors</name>
        <t>Some authors of adopted drafts do not respond for several months, despite repeated reminders <xref target="FormalAnalysisPAKE"/>.</t>
      </section>
      <section anchor="slots-at-meeting">
        <name>Slots at Meeting</name>
        <t>Formal analysis -- just like any other code development -- is an iterative process and needs to be progressively discussed with the WG to be able to propose secure solutions. So at least some time should be allocated in the meetings for discussion of formal analysis.</t>
        <ul spacing="normal">
          <li>
            <t>We requested a slot for 10 minutes (and 5 minutes if tight on schedule) for discussion of our questions about <xref target="I-D.ietf-tls-extended-key-update"/> at IETF 124. It seemed that the slots were spread over the meeting time to show that there is no time left for our topic. In the end, the meeting ended one hour earlier where 10 minutes from that could have been utilized for discussion on formal analysis of <xref target="I-D.ietf-tls-extended-key-update"/>. Given that the authors were informed <xref target="FormalAnalysisKeyUpdate"/> about the issues, what the authors presented was not very helpful in terms of progressing the formal analysis work and proposing some solutions. Key schedule is a subtle topic and not something we can talk effectively on the mic without a proper diagram on display. It is unclear why formal analysis is such a low priority to the chairs.</t>
          </li>
          <li>
            <t>If the authors are doing the formal analysis themselves, they should also present the current state of formal analysis for discussion. This will help the verifier give any feedback and avoid any repititive effort for the verifier.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="sec-res-authors">
      <name>Responsibilities of Authors</name>
      <t>This document proposes that the authors provide the following three items:</t>
      <section anchor="threat-model">
        <name>Threat Model</name>
        <t>A threat model outlines the assumptions and known weaknesses of the proposed protocol. The threat model could be the classical Dolev-Yao adversary. In addition, it could specify any keys (e.g., long-term keys or session keys) which may be compromised (i.e., available to the adversary).</t>
      </section>
      <section anchor="informal-security-goals">
        <name>Informal Security Goals</name>
        <t>Knowing what you want is the first step toward achieving it. Hence, informal security goals such as integrity, authentication, freshness, etc. should be outlined in the Internet-Draft.
If the informal security goals are not spelled out in the Internet-Draft, it is safe to assume that the goals are still unclear to the authors.</t>
      </section>
      <section anchor="protocol-diagram">
        <name>Protocol Diagram</name>
        <t>A protocol diagram should clearly mention the initial knowledge of the protocol participants, e.g., which authentic public keys are known to the protocol participants at the start of the protocol. An example of a protocol diagram for <xref target="I-D.fossati-tls-attestation-08"/> is provided in Figure 5 in <xref target="ID-Crisis"/>.</t>
      </section>
    </section>
    <section anchor="sec-res-verifier">
      <name>Responsibilities of Verifier</name>
      <t>When the authors declare the version as ready for formal analysis, the verifier takes the above inputs, performs the formal analysis, and brings the results back to the authors and the WG. Based on the analysis, the verifier may propose updates to the Security Considerations section or other sections of the Internet-Draft.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The whole document is about improving security considerations.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="I-D.fossati-tls-attestation-08">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="21" month="October" year="2024"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-08"/>
        </reference>
        <reference anchor="RFC4101">
          <front>
            <title>Writing Protocol Models</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author>
              <organization abbrev="IAB">Internet Architecture Board</organization>
            </author>
            <date month="June" year="2005"/>
            <abstract>
              <t>The IETF process depends on peer review. However, IETF documents are generally written to be useful for implementors, not reviewers. In particular, while great care is generally taken to provide a complete description of the state machines and bits on the wire, this level of detail tends to get in the way of initial understanding. This document describes an approach for providing protocol "models" that allow reviewers to quickly grasp the essence of a system. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4101"/>
          <seriesInfo name="DOI" value="10.17487/RFC4101"/>
        </reference>
        <reference anchor="TLS-FATT" target="https://github.com/tlswg/tls-fatt">
          <front>
            <title>TLS FATT Process</title>
            <author>
              <organization>IETF TLS WG</organization>
            </author>
            <date year="2025" month="June"/>
          </front>
        </reference>
        <reference anchor="ID-Crisis" target="https://www.researchgate.net/publication/398839141_Identity_Crisis_in_Confidential_Computing_Formal_Analysis_of_Attested_TLS">
          <front>
            <title>Identity Crisis in Confidential Computing: Formal Analysis of Attested TLS</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="November"/>
          </front>
        </reference>
        <reference anchor="I-D.irtf-cfrg-cryptography-specification">
          <front>
            <title>Guidelines for Writing Cryptography Specifications</title>
            <author fullname="Nick Sullivan" initials="N." surname="Sullivan">
              <organization>Cryptography Consulting LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare, Inc.</organization>
            </author>
            <date day="7" month="July" year="2025"/>
            <abstract>
              <t>   This document provides guidelines and best practices for writing
   technical specifications for cryptography protocols and primitives,
   targeting the needs of implementers, researchers, and protocol
   designers.  It highlights the importance of technical specifications
   and discusses strategies for creating high-quality specifications
   that cater to the needs of each community, including guidance on
   representing mathematical operations, security definitions, and
   threat models.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-cryptography-specification-02"/>
        </reference>
        <reference anchor="I-D.ietf-tls-extended-key-update">
          <front>
            <title>Extended Key Update for Transport Layer Security (TLS) 1.3</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Michael Tüxen" initials="M." surname="Tüxen">
              <organization>Münster Univ. of Applied Sciences</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Steffen Fries" initials="S." surname="Fries">
              <organization>Siemens</organization>
            </author>
            <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
              <organization>Zscaler</organization>
            </author>
            <date day="1" month="November" year="2025"/>
            <abstract>
              <t>   TLS 1.3 ensures forward secrecy by performing an ephemeral Diffie-
   Hellman key exchange during the initial handshake, protecting past
   communications even if a party's long-term keys are later
   compromised.  While the built-in KeyUpdate mechanism allows
   application traffic keys to be refreshed during a session, it does
   not incorporate fresh entropy from a new key exchange and therefore
   does not provide post-compromise security.  This limitation can pose
   a security risk in long-lived sessions, such as those found in
   industrial IoT or telecommunications environments.

   To address this, this specification defines an extended key update
   mechanism that performs a fresh Diffie-Hellman exchange within an
   active session, thereby ensuring post-compromise security.  By
   forcing attackers to exfiltrate new key material repeatedly, this
   approach mitigates the risks associated with static key compromise.
   Regular renewal of session keys helps contain the impact of such
   compromises.  The extension is applicable to both TLS 1.3 and DTLS
   1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-extended-key-update-07"/>
        </reference>
        <reference anchor="I-D.ietf-tls-8773bis">
          <front>
            <title>TLS 1.3 Extension for Using Certificates with an External Pre-Shared Key</title>
            <author fullname="Russ Housley" initials="R." surname="Housley">
              <organization>Vigil Security, LLC</organization>
            </author>
            <date day="5" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies a TLS 1.3 extension that allows TLS clients
   and servers to authenticate with certificates and provide
   confidentiality based on encryption with a symmetric key from the
   usual key agreement algorithm and an external pre-shared key (PSK).
   This Standards Track RFC (once approved) obsoletes RFC 8773, which
   was an Experimental RFC.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-8773bis-13"/>
        </reference>
        <reference anchor="FormalAnalysisPAKE" target="https://mailarchive.ietf.org/arch/msg/tls/igQGFE1INA6eR_Fdz8eTp74ffVc/">
          <front>
            <title>Formal analysis of draft-ietf-tls-pake</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2026" month="January"/>
          </front>
        </reference>
        <reference anchor="FormalAnalysisKeyUpdate" target="https://mailarchive.ietf.org/arch/msg/tls/P_VdWSi20TZG0rJEaz7VCPKDIOg/">
          <front>
            <title>Comments on draft-ietf-tls-extended-key-update</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 200?>

<section numbered="false" anchor="appendix">
      <name>Appendix</name>
      <section numbered="false" anchor="document-history">
        <name>Document History</name>
        <t>-01</t>
        <ul spacing="normal">
          <li>
            <t>Pain points of verifier <xref target="sec-prot-diagram"/></t>
          </li>
          <li>
            <t>Small adjustment of phrasing</t>
          </li>
        </ul>
      </section>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
