<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.7) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-usama-seat-early-attestation-is-broken-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Early Attestation is Broken</title>
    <seriesInfo name="Internet-Draft" value="draft-usama-seat-early-attestation-is-broken-00"/>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <date year="2026" month="January" day="13"/>
    <area>Security</area>
    <workgroup>Secure Evidence and Attestation Transport</workgroup>
    <abstract>
      <?line 46?>

<t>Sheffer et al. published <xref target="I-D.fossati-seat-early-attestation"/> on 9th January, 2025
and despite being wildly out of scope of SEAT charter, the draft made its place -- getting
two-thirds of meeting time -- in the agenda for upcoming SEAT interim meeting within hours of
publishing. In comparison, our request to present <xref target="I-D.fossati-seat-expat"/> fully within the charter
was refused.
In this document, we disprove the claim made in <xref target="I-D.fossati-seat-early-attestation"/> for backward compatibility
with standard TLS <xref target="I-D.ietf-tls-rfc8446bis"/>. We argue that <xref target="I-D.fossati-seat-expat"/> is a
much more reaonsable way of achieving the goal within the scope of SEAT charter.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://muhammad-usama-sardar.github.io/seat-early-attestation-broken/draft-usama-seat-early-attestation-is-broken.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-usama-seat-early-attestation-is-broken/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Evidence and Attestation Transport Working Group mailing list (<eref target="mailto:seat@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/seat"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/seat/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/muhammad-usama-sardar/seat-early-attestation-broken"/>.</t>
    </note>
  </front>
  <middle>
    <?line 58?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>We argue that:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="I-D.fossati-seat-early-attestation"/> is out of scope of SEAT WG charter.</t>
        </li>
        <li>
          <t>Several claims in <xref target="I-D.fossati-seat-early-attestation"/> are broken.
Specifically, we prove that proposed key schedule is inconsistent with <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
        </li>
        <li>
          <t><xref target="I-D.fossati-seat-early-attestation"/> breaks most -- if not all -- proofs done to date for TLS 1.3.</t>
        </li>
      </ul>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="out-of-scope">
      <name>Out of Scope</name>
      <t><xref target="SEAT-Charter"/> has:</t>
      <blockquote>
        <t>The attested (D)TLS protocol extension will not modify the (D)TLS
protocol itself. It may define (D)TLS extensions to support its goals
but will not modify, add, or remove any existing protocol messages
or modify the key schedule.</t>
      </blockquote>
      <t>Contrary to the crystal clear statement of scope:</t>
      <ul spacing="normal">
        <li>
          <t><xref section="4.1" sectionFormat="of" target="I-D.fossati-seat-early-attestation"/> adds a new protocol message named "Attestation".</t>
        </li>
        <li>
          <t><xref section="5.6" sectionFormat="of" target="I-D.fossati-seat-early-attestation"/> modifies the key schedule.</t>
        </li>
      </ul>
      <t>Both are subtle and error-prone. Such intesive changes should not bypass FATT process at TLS WG by any means.
SEAT has just a mention of formal analysis in its charter and no real process.
SEAT also does not have the blessing of many TLS experts. It makes pursuing
such a work in SEAT almost surely to lead to failure. We recommend the authors of
<xref target="I-D.fossati-seat-early-attestation"/> to submit the draft to TLS WG, where such
changes are in scope.</t>
      <section anchor="comparison-with-our-draft">
        <name>Comparison with our draft</name>
        <t>In comparison, <xref target="I-D.fossati-seat-expat"/> makes no changes to TLS and is fully in scope of SEAT charter.</t>
      </section>
    </section>
    <section anchor="broken-claims">
      <name>Broken Claims</name>
      <t>Too many claims in <xref target="I-D.fossati-seat-early-attestation"/> are broken. We present one example which invalidates
most of other claims. The key schedule proposed in <xref section="5.6" sectionFormat="of" target="I-D.fossati-seat-early-attestation"/> is not consistent
with <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      <t>Using notations from <xref target="Key-Schedule"/>:</t>
      <artwork><![CDATA[
hs = HKDF-Extract(salt1,gxy)
]]></artwork>
      <t>whereas this draft proposes:</t>
      <artwork><![CDATA[
hs' = HKDF-Extract(0,gxy)
]]></artwork>
      <section anchor="sec-proof">
        <name>Proof</name>
        <t>Using definition of salt1 <xref target="Key-Schedule"/>:</t>
        <artwork><![CDATA[
salt1 != 0
]]></artwork>
        <t>Therefore, it comes that:</t>
        <artwork><![CDATA[
hs != hs'
]]></artwork>
        <t>Hence, the key schedule in <xref target="I-D.fossati-seat-early-attestation"/> is inconsistent with <xref target="I-D.ietf-tls-rfc8446bis"/>.</t>
      </section>
      <section anchor="comparison-with-our-draft-1">
        <name>Comparison with our draft</name>
        <t>In comparison, <xref target="I-D.fossati-seat-expat"/> uses standard TLS key schedule without any changes.</t>
      </section>
    </section>
    <section anchor="breaking-formal-proofs">
      <name>Breaking Formal Proofs</name>
      <t>Because of above key schedule change, the draft breaks most -- if not all -- proofs done to date for TLS 1.3.</t>
      <section anchor="comparison-with-our-draft-2">
        <name>Comparison with our draft</name>
        <t>In comparison, we are making a careful effort to preserve security properties for our draft <xref target="I-D.fossati-seat-expat"/>.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This draft helps make this world more secure by refuting the security claims in <xref target="I-D.fossati-seat-early-attestation"/>
and by pushing against disruption of FATT process of TLS WG. Security is dependent on weakest link and we believe
<xref target="I-D.fossati-seat-early-attestation"/> is the weakest link in the security of TLS. Hence, we view post-handshake attestation
as the most appropriate option.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.fossati-seat-early-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <date day="9" month="January" year="2026"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using remote attestation
   which is a process by which an entity produces Evidence about itself
   that another party can use to appraise whether that entity is found
   in a secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enable the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation Evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and to use them mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-seat-early-attestation-00"/>
        </reference>
        <reference anchor="I-D.fossati-seat-expat">
          <front>
            <title>Remote Attestation with Exported Authenticators</title>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Muhammad Usama Sardar" initials="M. U." surname="Sardar">
              <organization>TU Dresden</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <date day="20" month="October" year="2025"/>
            <abstract>
              <t>   This specification defines a method for two parties in a
   communication interaction to exchange Evidence and Attestation
   Results using exported authenticators, as defined in [RFC9261].
   Additionally, it introduces the cmw_attestation extension, which
   allows attestation credentials to be included directly in the
   Certificate message sent during the Exported Authenticator-based
   post-handshake authentication.  The approach supports both the
   passport and background check models from the RATS architecture while
   ensuring that attestation remains bound to the underlying
   communication channel.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-seat-expat-00"/>
        </reference>
        <reference anchor="SEAT-Charter" target="https://datatracker.ietf.org/wg/seat/about/">
          <front>
            <title>Secure Evidence and Attestation Transport (SEAT): Charter for Working Group</title>
            <author initials="" surname="IETF">
              <organization/>
            </author>
            <date/>
          </front>
        </reference>
        <reference anchor="Key-Schedule" target="https://www.researchgate.net/publication/396245726_Perspicuity_of_Attestation_Mechanisms_in_Confidential_Computing_Validation_of_TLS_13_Key_Schedule">
          <front>
            <title>Perspicuity of Attestation Mechanisms in Confidential Computing: Validation of TLS 1.3 Key Schedule</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <date year="2025" month="October"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 180?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We thank the authors of <xref target="I-D.fossati-seat-early-attestation"/> for putting together something,
which is already long overdue.</t>
      <t>Since the proof in <xref target="sec-proof"/> is based on the working done in <xref target="Key-Schedule"/>, we thank
all those acknowledged there: namely Arto Niemi, Hannes Tschofenig, Thomas Fossati, Eric Rescorla,
and Ionut Mihalcea</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
