[Seat] Re: New Version Notification for draft-fossati-seat-early-attestation-00.txt

"jiangyuning (A)" <jiangyuning2@h-partners.com> Sun, 11 January 2026 04:29 UTC

Return-Path: <jiangyuning2@h-partners.com>
X-Original-To: seat@mail2.ietf.org
Delivered-To: seat@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 85389A5F7339 for <seat@mail2.ietf.org>; Sat, 10 Jan 2026 20:29:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -4.195
X-Spam-Level:
X-Spam-Status: No, score=-4.195 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZiNjK2AyGd3N for <seat@mail2.ietf.org>; Sat, 10 Jan 2026 20:29:26 -0800 (PST)
Received: from frasgout.his.huawei.com (frasgout.his.huawei.com [185.176.79.56]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id DEDE4A5F732A for <seat@ietf.org>; Sat, 10 Jan 2026 20:29:23 -0800 (PST)
Received: from mail.maildlp.com (unknown [172.18.224.83]) by frasgout.his.huawei.com (SkyGuard) with ESMTPS id 4dpjFY08K4zJ467Y; Sun, 11 Jan 2026 12:29:05 +0800 (CST)
Received: from kwepemh500011.china.huawei.com (unknown [7.202.181.142]) by mail.maildlp.com (Postfix) with ESMTPS id C5EE040569; Sun, 11 Jan 2026 12:29:13 +0800 (CST)
Received: from sinpeml100014.china.huawei.com (7.188.195.169) by kwepemh500011.china.huawei.com (7.202.181.142) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Sun, 11 Jan 2026 12:29:11 +0800
Received: from sinpeml500013.china.huawei.com (7.188.194.83) by sinpeml100014.china.huawei.com (7.188.195.169) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.36; Sun, 11 Jan 2026 12:29:11 +0800
Received: from sinpeml500013.china.huawei.com ([7.188.194.83]) by sinpeml500013.china.huawei.com ([7.188.194.83]) with mapi id 15.02.1544.011; Sun, 11 Jan 2026 12:29:11 +0800
From: "jiangyuning (A)" <jiangyuning2@h-partners.com>
To: Yogesh Deshpande <Yogesh.Deshpande@arm.com>, tirumal reddy <kondtir@gmail.com>, Yaron Sheffer <yaronf.ietf@gmail.com>
Thread-Topic: [Seat] Re: New Version Notification for draft-fossati-seat-early-attestation-00.txt
Thread-Index: ATI4MTIxv7huo7uPhDeR+E7PSFCNptSSWMIN//+LZYCAAAoQAIADDRgw
Date: Sun, 11 Jan 2026 04:29:10 +0000
Message-ID: <2c576148200e48cc98f59a64c47926d5@h-partners.com>
References: <176795898117.131929.7398156970484349562@dt-datatracker-5656579b89-r5kdq> <FRWP195MB276437A6C71671000C22EEF5A982A@FRWP195MB2764.EURP195.PROD.OUTLOOK.COM> <CAFpG3gc-=YdTcmFEqrHbMOXsB0XwwpT9RBMS2oS2Vrgk=F06hA@mail.gmail.com> <DB9PR08MB98513015E1FB681276C92A538E82A@DB9PR08MB9851.eurprd08.prod.outlook.com>
In-Reply-To: <DB9PR08MB98513015E1FB681276C92A538E82A@DB9PR08MB9851.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.81.247.141]
Content-Type: multipart/alternative; boundary="_000_2c576148200e48cc98f59a64c47926d5hpartnerscom_"
MIME-Version: 1.0
X-MailFrom: jiangyuning2@h-partners.com
X-Mailman-Rule-Hits: max-size
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; news-moderation; no-subject; digests; suspicious-header
Message-ID-Hash: 6R2HSCSYBDC56A3LIKQF7GXG2FUSXG64
X-Message-ID-Hash: 6R2HSCSYBDC56A3LIKQF7GXG2FUSXG64
X-Mailman-Approved-At: Sun, 11 Jan 2026 11:12:03 -0800
CC: "seat@ietf.org" <seat@ietf.org>, "Tirumaleswar Reddy.K" <k.tirumaleswar_reddy@nokia.com>, Ionut Mihalcea <Ionut.Mihalcea@arm.com>, Thomas Fossati <thomas.fossati@linaro.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Seat] Re: New Version Notification for draft-fossati-seat-early-attestation-00.txt
List-Id: "Secure Evidence and Attestation Transport (SEAT) WG" <seat.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/seat/agK5B-smkhawEEjFxSbA_8Pv_ns>
List-Archive: <https://mailarchive.ietf.org/arch/browse/seat>
List-Help: <mailto:seat-request@ietf.org?subject=help>
List-Owner: <mailto:seat-owner@ietf.org>
List-Post: <mailto:seat@ietf.org>
List-Subscribe: <mailto:seat-join@ietf.org>
List-Unsubscribe: <mailto:seat-leave@ietf.org>

Dear authors,

Thank you for the recent submission of this draft.

Building on my previous email and the role mapping discussion in GitHub Issue #23 [1], where I analyzed attester roles (client, server, or mutual) across the use cases [2], I've now extended it with a detailed mapping of use cases to intra/post/hybrid needs.

I believe both intra-handshake (as in [3]) and post-handshake (as in [4]) solutions are essential. Not all use cases can be addressed by one approach alone, some benefit from intra for efficient setup-phase verification, while others require post for dynamic, runtime, or operation-triggered freshness without renegotiation. For example:

  *   Runtime Secret Provisioning and Attestation of Network Functions: this involves one-time attestation during initial bootstrapping (e.g., a workload or IoT device proving its state to fetch secrets). Also, in order to get secrets such as database credentials, post-handshake is also needed.
  *   Secure Multi-Party Computation (MPC): this is mutual setup-phase attestation; no explicit runtime elements.
  *   High-Assurance Command Execution and High-Assurance Operation Execution: this prefers post-handshake for fresh evidence over existing connections.

I'd appreciate help from the use case authors (as in [2]) and authors in intra-handshake (as in [3]) and post-handshake (as in [4]) solutions to further analyze and confirm which scenarios require intra, post, or a hybrid approach.
Looking forward to your thoughts on this!

Best regards,
Yuning

[1] https://github.com/tls-attestation/use-cases-and-properties/issues/23
[2] https://datatracker.ietf.org/doc/draft-mihalcea-seat-use-cases/
[3] https://datatracker.ietf.org/doc/draft-fossati-seat-early-attestation/
[4] https://datatracker.ietf.org/doc/draft-fossati-seat-expat/

From: Yogesh Deshpande <Yogesh.Deshpande@arm.com>
Sent: Friday, January 9, 2026 9:25 PM
To: tirumal reddy <kondtir@gmail.com>; Yaron Sheffer <yaronf.ietf@gmail.com>
Cc: seat@ietf.org; Tirumaleswar Reddy.K <k.tirumaleswar_reddy@nokia.com>; Ionut Mihalcea <Ionut.Mihalcea@arm.com>; Thomas Fossati <thomas.fossati@linaro.org>
Subject: [Seat] Re: New Version Notification for draft-fossati-seat-early-attestation-00.txt

I fully agree and support view presented by Tiru below!!

From: tirumal reddy <kondtir@gmail.com<mailto:kondtir@gmail.com>>
Sent: Friday, January 9, 2026 12:49 PM
To: Yaron Sheffer <yaronf.ietf@gmail.com<mailto:yaronf.ietf@gmail.com>>
Cc: seat@ietf.org<mailto:seat@ietf.org>; Tirumaleswar Reddy.K <k.tirumaleswar_reddy@nokia.com<mailto:k.tirumaleswar_reddy@nokia.com>>; Ionut Mihalcea <Ionut.Mihalcea@arm.com<mailto:Ionut.Mihalcea@arm.com>>; Thomas Fossati <thomas.fossati@linaro.org<mailto:thomas.fossati@linaro.org>>; Yogesh Deshpande <Yogesh.Deshpande@arm.com<mailto:Yogesh.Deshpande@arm.com>>
Subject: Re: [Seat] Re: New Version Notification for draft-fossati-seat-early-attestation-00.txt

I would like to note that the intra-handshake and post-handshake attestation drafts are designed to achieve the same core security properties, including binding attestation to the TLS connection and TLS identity. Both drafts support re-attestation and prevent relay attack.

Each draft has its own advantages and disadvantages, and I believe both approaches are useful for the WG to evaluate.

Best Regards,
-Tiru

On Fri, 9 Jan 2026 at 17:38, Yaron Sheffer <yaronf.ietf@gmail.com<mailto:yaronf.ietf@gmail.com>> wrote:
We have just submitted -00 of this draft, our proposed intra-handshake protocol to address the SEAT use cases. The editor team is Tiru, Ionut, Thomas, Yogesh and myself.

This is a massive rewrite of the previous draft-fossati-tls-attestation with many changes that resolve security and other concerns that were raised with that draft. Among others, we decoupled attestation from certificate messages and redefined the cryptographic binding between the TLS connection and attestation artifacts. However, from an application’s point of view, the new protocol preserves the simplicity of the intra-HS approach.

This is a lot of reading, so let me point out some key sections:

  *   The last part of the Introduction describes the advantages we see with the intra-HS approach.

  *   Sec. 3.2 describes the full set of extensions we propose to the TLS protocol, and is an informal argument why, despite meddling with the handshake, we are not “breaking TLS”.

  *   Sec. 5.3 goes through the details of one of the top use cases: server attestation.

  *   Sec. 5.8 describes how the cryptographic binding in this protocol addresses a relay attack that’s been discussed on this list.

  *   And Sec. 7.2 shows how we deal with attestation freshness, even for long-standing TLS connections.

Thanks,
      Yaron

From: internet-drafts@ietf.org<mailto:internet-drafts@ietf.org> <internet-drafts@ietf.org<mailto:internet-drafts@ietf.org>>
Date: Friday, 9 January 2026 at 13:43
To: Tirumaleswar Reddy.K <k.tirumaleswar_reddy@nokia.com<mailto:k.tirumaleswar_reddy@nokia.com>>, Ionut Mihalcea <Ionut.Mihalcea@arm.com<mailto:Ionut.Mihalcea@arm.com>>, Ionut Mihalcea <Ionut.Mihalcea@arm.com<mailto:Ionut.Mihalcea@arm.com>>, Thomas Fossati <thomas.fossati@linaro.org<mailto:thomas.fossati@linaro.org>>, Tirumaleswar Reddy <k.tirumaleswar_reddy@nokia.com<mailto:k.tirumaleswar_reddy@nokia.com>>, Yaron Sheffer <yaronf.ietf@gmail.com<mailto:yaronf.ietf@gmail.com>>, Yogesh Deshpande <Yogesh.Deshpande@arm.com<mailto:Yogesh.Deshpande@arm.com>>, Yogesh Deshpande <Yogesh.Deshpande@arm.com<mailto:Yogesh.Deshpande@arm.com>>
Subject: New Version Notification for draft-fossati-seat-early-attestation-00.txt
A new version of Internet-Draft draft-fossati-seat-early-attestation-00.txt
has been successfully submitted by Yaron Sheffer and posted to the
IETF repository.

Name:     draft-fossati-seat-early-attestation
Revision: 00
Title:    Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
Date:     2026-01-09
Group:    Individual Submission
Pages:    34
URL:      https://www.ietf.org/archive/id/draft-fossati-seat-early-attestation-00.txt
Status:   https://datatracker.ietf.org/doc/draft-fossati-seat-early-attestation/
HTML:     https://www.ietf.org/archive/id/draft-fossati-seat-early-attestation-00.html
HTMLized: https://datatracker.ietf.org/doc/html/draft-fossati-seat-early-attestation


Abstract:

   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using remote attestation
   which is a process by which an entity produces Evidence about itself
   that another party can use to appraise whether that entity is found
   in a secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enable the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation Evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and to use them mutually.



The IETF Secretariat
_______________________________________________
Seat mailing list -- seat@ietf.org<mailto:seat@ietf.org>
To unsubscribe send an email to seat-leave@ietf.org<mailto:seat-leave@ietf.org>
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.