[Seat] Re: Fwd: New Version Notification for draft-usama-seat-intra-vs-post-00.txt
Markus Rudy <mr@edgeless.systems> Mon, 19 January 2026 14:06 UTC
Return-Path: <mr@edgeless.systems>
X-Original-To: seat@mail2.ietf.org
Delivered-To: seat@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 7B775A9E69E0 for <seat@mail2.ietf.org>; Mon, 19 Jan 2026 06:06:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=edgeless.systems
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1QCwZH4t9xF6 for <seat@mail2.ietf.org>; Mon, 19 Jan 2026 06:06:48 -0800 (PST)
Received: from DB3PR0202CU003.outbound.protection.outlook.com (mail-northeuropeazon11020077.outbound.protection.outlook.com [52.101.84.77]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id BCA57A9E69D9 for <seat@ietf.org>; Mon, 19 Jan 2026 06:06:48 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=fYpbBaYB+IBcv6YK8g7xQVLte/CzpkaylTy+Dqx+sq7ekCxcRxJj56hxPKXvMveLkrqFbQW4nx1eN/GHdXAkkOX+RaaTLDVOo0QbEqkotusa6W+BftGo5SZTRV2ZM6dGuA4yMxjifs6g5Tk7ZWzthLSmIgGx2IEuKopl5I2+DM+Z428FmZB73K2osBKdJrd1wWw5wiV1VqjbAwDxX9haOwLrkEaWFe/NdAsBiQes6F6h5sp11stTO9ueOUnHyn+VGZGc9D+9zXXTxcBwGcAZ8keclvHotqwoRoasNFO18HfbyQSyABTfLZwimg9boXg9rp4mvd54idNPnD4liML+Nw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IObYFgrlT6qeStdpLHJGa2nMKSig6JkNy6tQ+ZuP5ls=; b=AYihrj2dUz+jCDV9AIJI21wIrFVmPbNPY/NLqO7Hq0XzZoZrGjr43kDgZIUAFZN+tLwq+ka+2ogwN+c82w7nvbTge5jCnpBGL0rBhY94v+nrmmov4Q+p6P0bg2bIgCWwEOLot1WAIHdn7M6PEc1gVrOCtSPoLa5eKyUYSoQGuMKcO3Gcq4SgFlI0dlxfO10qasjBNu39m+1o+iVaU2dFBCpn/LA9crJSU94EnGlhHhRnJQWqMi9MoPSX224YF/Ss4F2zo0mNHTdoa/JkNh7+WaeK/nw+KH8bHglGFcrj3GCPTEWq1ZvSO0u5hAq/roaHR+QvA0Q/iMPOvghzzTGvnA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=edgeless.systems; dmarc=pass action=none header.from=edgeless.systems; dkim=pass header.d=edgeless.systems; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=edgeless.systems; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IObYFgrlT6qeStdpLHJGa2nMKSig6JkNy6tQ+ZuP5ls=; b=rbu3YzviuJ7ztpt6kwCxTufWkPtVr7+MrnIawOwnCEwBwE6Cv3LfqdhfKVf1/gDltxde68QhJZqE61oNlvEHRuSHTUFp8tOSqfUUrMg90GQl8gbrNdlZHgUKBZ/N8X6d6rOWgRBd3s3NhLIZWVDppttKXTdhjdZQQWr08iEu5oo=
Received: from MRWPR02MB12086.eurprd02.prod.outlook.com (2603:10a6:501:83::19) by AM9PR02MB6545.eurprd02.prod.outlook.com (2603:10a6:20b:2d3::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9520.12; Mon, 19 Jan 2026 14:06:41 +0000
Received: from MRWPR02MB12086.eurprd02.prod.outlook.com ([fe80::6ed0:372a:3f4a:2abe]) by MRWPR02MB12086.eurprd02.prod.outlook.com ([fe80::6ed0:372a:3f4a:2abe%7]) with mapi id 15.20.9520.011; Mon, 19 Jan 2026 14:06:41 +0000
From: Markus Rudy <mr@edgeless.systems>
To: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
Thread-Topic: [Seat] Fwd: New Version Notification for draft-usama-seat-intra-vs-post-00.txt
Thread-Index: AQHchbZmtZ3wizu4IE6S1EGUXhn4e7VUm55PgACGjQCABGLwVA==
Date: Mon, 19 Jan 2026 14:06:40 +0000
Message-ID: <MRWPR02MB1208679D820413B0717B5218DB788A@MRWPR02MB12086.eurprd02.prod.outlook.com>
References: <176842793747.1254874.3791472032629185933@dt-datatracker-5656579b89-r5kdq> <5bfe3bab-8e79-444b-b01b-2ebe95678840@tu-dresden.de> <MRWPR02MB12086DD646B9BBF5983E2D633B78DA@MRWPR02MB12086.eurprd02.prod.outlook.com> <9c86282e-d007-4449-a571-16cb7fe6b3b2@tu-dresden.de>
In-Reply-To: <9c86282e-d007-4449-a571-16cb7fe6b3b2@tu-dresden.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=edgeless.systems;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: MRWPR02MB12086:EE_|AM9PR02MB6545:EE_
x-ms-office365-filtering-correlation-id: 1f5c4420-08fd-4091-c08c-08de5763f826
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|1800799024|10070799003|366016|38070700021;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MRWPR02MB12086.eurprd02.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(10070799003)(366016)(38070700021);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: edgeless.systems
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MRWPR02MB12086.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1f5c4420-08fd-4091-c08c-08de5763f826
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jan 2026 14:06:40.9577 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: adb650a8-5da3-4b15-b4b0-3daf65ff7626
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: CW0k/qGUVjfRQatXj53HbbeOHKYBrxVPA3fI69J3NqtmABVFtRK7RMtLw6u2HczsOjAYYaXniJVVKdDixsVzkg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR02MB6545
Message-ID-Hash: OB2HVUFCK3UKLNFCOS27TK4ZRWYG74JJ
X-Message-ID-Hash: OB2HVUFCK3UKLNFCOS27TK4ZRWYG74JJ
X-MailFrom: mr@edgeless.systems
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: "seat@ietf.org" <seat@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Seat] Re: Fwd: New Version Notification for draft-usama-seat-intra-vs-post-00.txt
List-Id: "Secure Evidence and Attestation Transport (SEAT) WG" <seat.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/seat/iAeCQLna8FdfoQGV3P-mEHUobn4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/seat>
List-Help: <mailto:seat-request@ietf.org?subject=help>
List-Owner: <mailto:seat-owner@ietf.org>
List-Post: <mailto:seat@ietf.org>
List-Subscribe: <mailto:seat-join@ietf.org>
List-Unsubscribe: <mailto:seat-leave@ietf.org>
Hi Usama, Contrast is the main product that should be named. Constellation was using the same protocol, but the project is archived since 2026. Funnily enough, I just learned that our earlier SGX-based products did post-handshake attestation. I don't know whether our patterns justify a new use case, but since you asked: A Contrast system has three types of participants - User, Coordinator, Workload. The latter two types run in TEEs, with the following communication flows (numbered for reference, not for temporal ordering): 1. The user creates an aTLS channel to the Coordinator, and if it passes all checks the user configures it with root key material. The Coordinator creates an internal CA for workloads. Only the Coordinator attests. This happens infrequently. 2. Workloads create aTLS channels to the Coordinator and send a CSR. If the Coordinator is satisfied with the workload's attestation, it signs a certificate for the workload. Together with the CA certificate, workloads can now communicate with standard mTLS using these certificates (no more attestation involved). This happens frequently (with Kubernetes pod starts/restarts). While the CSR could be signed without an attested TLS channel, it's easier for the workload to trust the response this way. Furthermore, some workloads also obtain a persistent secret seed over this channel, which they can use to derive durable key material themselves (e.g. volume decryption key). 3. Coordinators contact other Coordinators to obtain the root key material for themselves. Both sides need to attest to ensure trustworthiness. This happens infrequently. I did a quick experiment in our testing lab, running on the same machine as the Coordinator: 1. TCP connections are local, and thus the TCP connection establishment unsurprisingly takes only 0.5ms. But even to neighbouring nodes in the same cluster, the TCP handshake takes below 2ms. 2. I measured generation of evidence including the TLS session establishment, but with these numbers I don't think it makes a lot of difference: - SNP: Median time of 140ms from TCP SYN to TLS channel established and evidence sent to the client. - TDX: Median time of 1020ms, same procedure. I don't know why it is that slow, it should only be making machine-local remote calls, if any. 3. So far, I only managed to measure TDX verification, which adds another 340ms. This is bound by remote HTTP requests, afaiu, and could be optimized with locally cached collateral, CRL, etc. I'd expect SNP to exhibit similar timing, because verification does similar remote calls. Cheers, Markus ________________________________________ From: Muhammad Usama Sardar Sent: Friday, January 16, 2026 7:34 PM To: Markus Rudy Cc: seat@ietf.org Subject: Re: [Seat] Fwd: New Version Notification for draft-usama-seat-intra-vs-post-00.txt Hi Markus, Thanks very much for sharing your insights. I believe these are all very good and practical points. Unless someone objects with valid reasons, I will add them in the next version adding your name in the contributors. Please see a few notes inline: On 16.01.26 14:41, Markus Rudy wrote: Edgeless Systems has been using intra-handshake attested TLS in production since 2022, in at least two distinct confidential computing software products. >From your presentation at CCC Attestation SIG, I am aware of Contrast. Would you mind sharing other Edgeless Systems products using attested TLS? I would like to mention them in "scope" in the editor's draft [0] for next version. From the [use-cases], we align mostly with *3.2. Secure Provisioning*: automatic dissemination of configuration and secrets between mutually attesting TEEs. As author of [use-cases] draft: Please feel free to share your use case more precisely or propose edits. -00 was just a starting point. I would very much like to hear from the community how they are actually using it in production. So your input is crucial here. If you feel you have other use cases, I welcome those use cases too. Please share a short paragraph or two explaining the use in particular: Whether server is Attester or client is Attester (there may be mutual too, but we are trying to identify which is the main party being attested) What kind of secret is sent after successful attestation? What does the Attester do after getting the secret? An updated version with more use cases is at [1]. 4. I don't think saving extra roundtrips is an appropriate design goal when attestation is required. Generating evidence alone takes much longer than normal network roundtrip times, not even speaking of verification. It was one of the key points raised by the proponents of intra-handshake attestation. So in an attempt to be unbiased, I just put it in the draft for WG discussion. If you could please provide some numbers from your production, it will be great as an independent data point. For example, given a specific TEE (e.g., AMD SEV-SNP, Intel TDX or Intel SGX) and a specific scenario: Typical time for generation of evidence Typical time for appraisal of evidence Typical network time from Client to Server and back to Client (without any operation in between) B. It should be possible to port the general shape of a post-handshake attested TLS protocol to other protocols that provide secure channels and session binding (Noise comes to mind). I see a lot of value in what you are proposing. Design, verification and audit effort will be one-time and any protocol (not just Noise) which has support for exporters can then use it without changing each and every protocol. This requirement was also mentioned at Linux Plumbers Conference 2025. -Usama [0] https://muhammad-usama-sardar.github.io/seat-intra-vs-post/feedback/draft-usama-seat-intra-vs-post.html [1] https://tls-attestation.github.io/use-cases-and-properties/draft-mihalcea-seat-use-cases.html#section-3
- [Seat] Fwd: New Version Notification for draft-us… Muhammad Usama Sardar
- [Seat] Re: Fwd: New Version Notification for draf… Paul Wouters
- [Seat] Re: Fwd: New Version Notification for draf… Muhammad Usama Sardar
- [Seat] Re: Fwd: New Version Notification for draf… Paul Wouters
- [Seat] Re: Fwd: New Version Notification for draf… Muhammad Usama Sardar
- [Seat] Re: Fwd: New Version Notification for draf… Paul Wouters
- [Seat] Re: Fwd: New Version Notification for draf… Muhammad Usama Sardar
- [Seat] Re: Fwd: New Version Notification for draf… Ayoub Benaissa
- [Seat] Re: Fwd: New Version Notification for draf… Ayoub Benaissa
- [Seat] Re: Fwd: New Version Notification for draf… Markus Rudy
- [Seat] Re: Fwd: New Version Notification for draf… Muhammad Usama Sardar
- [Seat] Re: Fwd: New Version Notification for draf… Ayoub Benaissa
- [Seat] Re: Fwd: New Version Notification for draf… Markus Rudy
- [Seat] Re: Fwd: New Version Notification for draf… Muhammad Usama Sardar
- [Seat] Re: Fwd: New Version Notification for draf… Muhammad Usama Sardar
- [Seat] Re: Fwd: New Version Notification for draf… Muhammad Usama Sardar