[Seat] Re: Fwd: New Version Notification for draft-usama-seat-intra-vs-post-02.txt

Yaroslav Rosomakho <yrosomakho@zscaler.com> Thu, 22 January 2026 08:27 UTC

Return-Path: <yrosomakho@zscaler.com>
X-Original-To: seat@mail2.ietf.org
Delivered-To: seat@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 5023AAB5B4E2 for <seat@mail2.ietf.org>; Thu, 22 Jan 2026 00:27:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=zscaler.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q4uwfZSlWPFL for <seat@mail2.ietf.org>; Thu, 22 Jan 2026 00:27:50 -0800 (PST)
Received: from mail-vs1-xe2f.google.com (mail-vs1-xe2f.google.com [IPv6:2607:f8b0:4864:20::e2f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id F345DAB5B4DB for <seat@ietf.org>; Thu, 22 Jan 2026 00:27:49 -0800 (PST)
Received: by mail-vs1-xe2f.google.com with SMTP id ada2fe7eead31-5ecddf73062so399716137.1 for <seat@ietf.org>; Thu, 22 Jan 2026 00:27:49 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; t=1769070463; cv=none; d=google.com; s=arc-20240605; b=XH4Lry+nxGETNYtWjVv0ZQVa2lAUygVAFfLaNICskrxt77roziErKIuT9+diPLt5dX F4KwwMahLF4NSNSpv9GRijp8ahIEZm7aX+TvJB7D8lkmJoPUV/k7pf9+iEDAQJx2xowz byAGD364i32b32RY1ik/6Ry4YQgrI2hOwCr6QriI4DC0YR7hq+HZ7DaCkJjsYtWxcgHk gVw7n8ieckpAQ0KahDhzpspHX4Z2352OEgf2oVDuBkHSI2JlmI5xeh2Be1Bx+Ji3xUTr wXLdxnPkNKHVLiLA6uYpB6o4o3HWZp6yZmk97ncctx0bglXrfBSreWbAIjfwNeajVIzG j64w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=O05qaz3qg1v6e7CGwz9U5tPfTqf0ws5P4iy4j+ZJ5nY=; fh=ZF0dW/4RxiHfPjtOatT76H8Ly2jYzx9d01m8yy0KHlo=; b=XhOO5j5HrCYcctqzxQI63nJFsVzpE3S7BaxvmZGM8D14dRxYnXRTI+YJW/p68p15Qp 536Y6B+aZAeEIFRXs9dL3QiKr226XdNhhZtav5jSoD7d8G7PTUxa30oyCEORCPxzTdCh 9AexmGq4vS329iYMUAcF6DpyyaR6vTSc1uX9tmGEONtalJAGNqnR/lFaHio6jyRvvGsp s2eyGKdriE5fofTC1osZuMv5vvNihKM5mN1Muwi778zA49OomOXqugYnGM9vJfDpuodZ 0ccX69hx2G51A2334zREqAYLVlq1H8EIjeYpVVkI74RzUrCayHcoinm8Uyki5U9ShucQ xM9Q==; darn=ietf.org
ARC-Authentication-Results: i=1; mx.google.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zscaler.com; s=google; t=1769070463; x=1769675263; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=O05qaz3qg1v6e7CGwz9U5tPfTqf0ws5P4iy4j+ZJ5nY=; b=WfDYB62SORFhZe02st6ALkO7ppEmrJ3zUvuJQv2vAg9fpRyY1r6pIQDsTG3IhuTKQh 6f8K/RTd0B1PusLxEUhq3SQqUyD16ol0pTDhhsHD9LEDBo/EBRX5+lb7VKE+g7LAIFb6 gbTJKdN6/FdAf0977QhYjyYhHjZ1jZwxEzEtM=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1769070463; x=1769675263; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=O05qaz3qg1v6e7CGwz9U5tPfTqf0ws5P4iy4j+ZJ5nY=; b=P1F8EjQh4Vkn9Rxp0LkBIQ4OIcz4HGA+8uPlaIpsbj6WhFm8gWmiHwyVpYwnZVJjYh 5TCvqypfVsosezQUL5x4lIINrXYkmfl0r0xm6crUIRxubi18Jz5iyAA8qTBDZta67bpv /iuKkRLP6H1KyKDBj6M84ikW1mWp6wC8zdSlTag4I6j5BG4RmUVstjwA2yDlJLjuqw1w SUmlEPQUDkCAKtBDentcPRxmGM/YIIF7cTzqmxwqAI+51C3B5MOvcDCiInpO2csFtOZ1 Nw/jDQknEEcDvGbnElRfEDwxdk/nbwna4W8/XGzA7c5gl4glxBSHZosyAg50f9b7V2rM AzaQ==
X-Gm-Message-State: AOJu0YxxrlAYtKH4SpdRzom4nCbcyA0Hhe36sfHWFMr6WNWSDpo3QFRY P4KbLQ6Cq6k7iBrHElrp8pRzzbFAlU4GIOfdoYibd+cXjkvBGTiWVj8XUpUfgCAA5KSWhSg+mtJ Ff9fzqwl58gMZaYqBcf0VcmdIJEQ/Ynry4l/ffuRQql+EBB9Fc9J13L3cda1XwjgKeymLk40A9I skDbFbfiM2g9Ifz/s5HiSwh5nfoQ==
X-Gm-Gg: AZuq6aLokQABNcUBsaXd2t2IT5oWWweeto6HLrJDzNITmqNdWCpv7A67nwoLtmuBCOT cfEwKaixKjBHF0jAFX+UyVcIA2UKXivgB1EFRU2wobVSnk1NAV9uVtudMy74FkYhSran+YjmDMv SiaHki+MMW7Lkj0PSrYItVB6lyxWLmpZuVTWsoaSm6uQM9AiHJIVx28T0mIuAA5U6xg9uHnbNe7 vLRADcbQbq4ZffkpA1gLXkv4JU/1LMpp9iM4ZofJEJlTqN06USwZW1NVrsaZpci01brhgE=
X-Received: by 2002:a05:6102:3914:b0:5db:dad4:840 with SMTP id ada2fe7eead31-5f532e912bdmr854534137.12.1769070463158; Thu, 22 Jan 2026 00:27:43 -0800 (PST)
MIME-Version: 1.0
References: <176890236222.867028.3887971722243664931@dt-datatracker-865585c994-4fgh4> <651a244c-5c66-430e-a125-43d0161a06f7@tu-dresden.de>
In-Reply-To: <651a244c-5c66-430e-a125-43d0161a06f7@tu-dresden.de>
From: Yaroslav Rosomakho <yrosomakho@zscaler.com>
Date: Thu, 22 Jan 2026 15:27:32 +0700
X-Gm-Features: AZwV_QhtFBU7mnJwfkdcIayoHVmqowNcCAEg1on559GzzyiaAr_BEb4QhaOGeNM
Message-ID: <CAMtubr2hmi6HVzohH-RZ1gydkkWex_b=3mk=W9Jj4jC-zk+Jgw@mail.gmail.com>
To: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
Content-Type: multipart/alternative; boundary="0000000000008a22970648f5d048"
Message-ID-Hash: DHYYKHEPNUAVDZTF7AN7VIM5HIDD5HNF
X-Message-ID-Hash: DHYYKHEPNUAVDZTF7AN7VIM5HIDD5HNF
X-MailFrom: yrosomakho@zscaler.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "seat@ietf.org" <seat@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Seat] Re: Fwd: New Version Notification for draft-usama-seat-intra-vs-post-02.txt
List-Id: "Secure Evidence and Attestation Transport (SEAT) WG" <seat.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/seat/gQTdMo0OexLffcB1x39M4J57Ug4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/seat>
List-Help: <mailto:seat-request@ietf.org?subject=help>
List-Owner: <mailto:seat-owner@ietf.org>
List-Post: <mailto:seat@ietf.org>
List-Subscribe: <mailto:seat-join@ietf.org>
List-Unsubscribe: <mailto:seat-leave@ietf.org>

Hi Usama.

Here is my review as an individual contributor (not wearing any hats).

Overall, I find the discussion useful and the concrete implementation
feedback (such as latency measurements) very valuable. I do think a few
conclusions are currently stated more strongly than the text supports.

Section 3 (Pre-handshake attestation):

The current dismissal seems to assume Evidence can be arbitrarily old
relative to connection establishment. Many signed artifacts carry issuance
time and validity constraints (e.g., JWT iat/exp [0], HTTP Message
Signatures created/expires [1], SAML conditions [2]). A timestamp alone is
not the same as freshness, but a short validity window plus a trustworthy
time source can be an acceptable assurance mechanism in some deployments.
Likewise, some schemes can provide stronger freshness via verifier-chosen
challenges or monotonic counters. I suggest separating "not contemporaneous
with this TLS connection" from "too old to be meaningful", and discussing
under what threat models / deployment assumptions pre-handshake is
insufficient.
Section 3 does not currently mention potential benefits of pre-handshake
(e.g., no modification of TLS, no changes to application protocols,
potential caching/scalability advantages). Even if you ultimately judge
these insufficient, listing them would make the draft more balanced.

Section 4 (Intra-handshake attestation):

I don't think "embedding evidence in the handshake" automatically
guarantees freshness. Freshness typically depends on an unpredictable,
single-use challenge and clear replay handling. If Evidence (or the
challenge it is bound to) can be reused, the freshness property doesn't
follow merely from being carried in handshake messages.
More generally, the text would benefit from explicitly stating what is
being bound to what (e.g., transcript hash, exporter, traffic secrets,
application traffic secrets) and which concrete mechanisms provide that
binding.

Section 4.1.2 / 4.2.4 (Round trips and latency):

The argument that avoiding an extra RTT is not a relevant goal may depend
heavily on deployment topology (LAN vs same-region vs cross-continent). The
data point you include is still helpful.
Section 4.2.4 (high handshake latency) seems closely related to 4.1.2; you
might consider merging them and broadening the analysis to include
"baseline handshake costs" (including how PQ transition may change the
baseline).

Section 4.2.1 (Limited claims availability):

I'm not convinced the limitation is specific to intra-handshake without a
clearer definition. What exactly is meant by "limited claims"? Which claims
are unavailable intra-handshake but available pre- or post-handshake, and
why? Concrete examples (even a short list) would help.

Section 4.2.2 (Invasive changes in TLS):

It's not clear to me that intra-handshake attestation inherently requires
modifications to the TLS key schedule. Could a design based on standard TLS
extensions and explicit transcript/channel binding (via early exporters)
satisfy the required security properties? If not, it would be useful to
explain in the draft text which properties force more invasive changes.

Section 5.1.4 (Latency placement):

I don't think that moving latency related to attestation into after
handshake is always a good thing. In some real-time and streaming
applications, a spike after the session is established may be much more
disruptive than paying a cost during the handshake. It would help to
discuss this as a trade-off.

Section 5.1.6 (Ease of implementation):

A working demo is great, but I'm not sure it translates directly into "ease
of implementation" for production deployments. Production-oriented examples
(especially showing Exported Authenticators usage) would make this argument
much more compelling.

Section 5.2.1 (Impact on application layer):

This is my biggest concern with the post-handshake approach as currently
written. Exported Authenticators define a secure way to serialise and bind
authenticators, but each application protocol still needs a way to
negotiate, carry, and process those structures. So far, this has not been
easy even for HTTP (HTTP working group is still focused only on unsolicited
server-side authenticators [3]). I suggest expanding this section into a
more concrete discussion of deployment paths, and what is realistically
required in applications and/or infrastructure.



The analysis appears to skip a potentially important design point: an
explicit shim or gating layer that performs attestation after the TLS
handshake completes but before any application data is exchanged. This is
operationally distinct from both intra-handshake attestation and fully
application-integrated post-handshake attestation. Such an approach could
preserve standard TLS handshake behaviour and latency characteristics,
avoid invasive TLS changes, and still prevent application data from flowing
until attestation succeeds. It may also mitigate some of the
application-layer complexity by localizing attestation handling to a
well-defined enforcement point (e.g., a sidecar or connection gate) rather
than requiring per-protocol integration.

Is there a specific reason this design point was excluded? If not, it may
be worth explicitly analysing it as a distinct option, or clarifying
whether and why it is considered equivalent to "post-handshake" in the
current text.


Hope this helps.

Best Regards,
Yaroslav

[0] https://www.rfc-editor.org/rfc/rfc7519.html#section-4.1.6
[1] https://www.rfc-editor.org/rfc/rfc9421.html#signature-params
[2] https://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf
[3]
https://datatracker.ietf.org/doc/draft-ietf-httpbis-secondary-server-certs

On Tue, Jan 20, 2026 at 5:29 PM Muhammad Usama Sardar <
muhammad_usama.sardar@tu-dresden.de> wrote:

> Hi,
>
> This version replaces our experiments with the experiments of Markus Rudy
> as independent data point. It also addresses the feedback [0] from Mike
> Bursell, the Executive Director of Confidential Computing Consortium (CCC).
> Thanks both!
>
> I welcome WG feedback/thoughts/critique on the draft. In case of critique,
> please propose text and provide references, if possible, to support your
> views. I request the same if you disagree with something.
>
> Looking forward to your ideas to mutually work to improve it.
> Thanks!
>
> -Usama
>
> [0] https://lists.confidentialcomputing.io/g/attestation/message/276
>
> -------- Forwarded Message --------
> Subject: New Version Notification for
> draft-usama-seat-intra-vs-post-02.txt
> Date: Tue, 20 Jan 2026 01:46:02 -0800
> From: internet-drafts@ietf.org
> To: Muhammad Sardar <muhammad_usama.sardar@tu-dresden.de>
> <muhammad_usama.sardar@tu-dresden.de>, Muhammad Usama Sardar
> <muhammad_usama.sardar@tu-dresden.de>
> <muhammad_usama.sardar@tu-dresden.de>
>
> A new version of Internet-Draft draft-usama-seat-intra-vs-post-02.txt has
> been
> successfully submitted by Muhammad Usama Sardar and posted to the
> IETF repository.
>
> Name: draft-usama-seat-intra-vs-post
> Revision: 02
> Title: Pre-, Intra- and Post-handshake Attestation
> Date: 2026-01-20
> Group: Individual Submission
> Pages: 18
> URL: https://www.ietf.org/archive/id/draft-usama-seat-intra-vs-post-02.txt
> Status: https://datatracker.ietf.org/doc/draft-usama-seat-intra-vs-post/
> HTML:
> https://www.ietf.org/archive/id/draft-usama-seat-intra-vs-post-02.html
> HTMLized:
> https://datatracker.ietf.org/doc/html/draft-usama-seat-intra-vs-post
> Diff:
> https://author-tools.ietf.org/iddiff?url2=draft-usama-seat-intra-vs-post-02
>
> Abstract:
>
> This document presents a taxonomy of extending TLS protocol with
> remote attestation, referred to as attested TLS. It also presents
> high-level analysis of benefits and limitations of each category,
> namely pre-handshake attestation, intra-handshake attestation and
> post-handshake attestation.
>
>
>
> The IETF Secretariat
>
>
> _______________________________________________
> Seat mailing list -- seat@ietf.org
> To unsubscribe send an email to seat-leave@ietf.org
>

-- 


This communication (including any attachments) is intended for the sole 
use of the intended recipient and may contain confidential, non-public, 
and/or privileged material. Use, distribution, or reproduction of this 
communication by unintended recipients is not authorized. If you received 
this communication in error, please immediately notify the sender and then 
delete all copies of this communication from your system.