<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.31 (Ruby 3.2.3) -->
<?rfc rfcedstyle="yes"?>
<?rfc tocindent="yes"?>
<?rfc strict="yes"?>
<?rfc comments="yes"?>
<?rfc text-list-symbols="-o*+"?>
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-zhang-seat-selection-00" category="info" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.32.0 -->
  <front>
    <title abbrev="SEAT-Selection">Balancing Security and Deployability in the Selection of Attested TLS Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-zhang-seat-selection-00"/>
    <author initials="J." surname="Zhang" fullname="Jun Zhang">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <email>junzhang1@huawei.com</email>
      </address>
    </author>
    <author initials="H." surname="Labiod" fullname="Houda Labiod">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <email>houda.labiod@huawei.com</email>
      </address>
    </author>
    <date/>
    <area>Security</area>
    <workgroup>SEAT</workgroup>
    <abstract>
      <?line 35?>

<t>This document analyzes the selection of Attested Transport Layer Security (aTLS) protocols, among pre-handshake, intra-handshake, and post-handshake aTLS protocols, 
focusing on the trade-off between theoretical security strength and practical deployability. The goal is to enable flexible, context-aware deployment of endpoint attestation while maintaining compatibility with existing infrastructure.</t>
    </abstract>
  </front>
  <middle>
    <?line 40?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>Attested TLS (aTLS) enables a TLS server to provide cryptographic proof of its endpoint behavior, including configuration, identity, and software integrity. This is essential for high-assurance use cases such as zero-trust architectures, compliance verification, and supply chain security.</t>
      <t>However, the timing and method of attestation delivery significantly affect both security strength and network deployability. This document considers three models:</t>
      <t>Pre-handshake: Attestation sent before TLS begins.</t>
      <t>Intra-handshake: Attestation embedded in TLS handshake messages.</t>
      <t>Post-handshake: Attestation sent after handshake completion.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC 2119.</t>
      <t>Attester: The entity that generates attestation evidence.</t>
      <t>Verifier: The entity that validates the attestation.</t>
      <t>Relying Party: The client or service relying on the attestation result.</t>
      <t>TLS Exporter: A TLS 1.3 mechanism to derive keying material from the handshake.</t>
      <t>Middlebox: Network devices that inspect or modify TLS traffic (e.g., firewalls, load balancers).</t>
    </section>
    <section anchor="the-theoretical-upper-bound-of-security">
      <name>The Theoretical Upper Bound of Security</name>
      <t>In an ideal world, aTLS should achieve the following security properties:</t>
      <t><strong>Cryptographic Binding</strong>: The attestation evidence MUST be cryptographically bound to the TLS session. Specifically, the evidence should cover the TLS handshake transcript (e.g., ClientHello...ServerHello). This prevents a "Man-in-the-Middle" (MITM) from stripping the attestation or replaying a valid attestation from a different session.</t>
      <t><strong>Freshness</strong>: The attestation must be fresh, preventing replay attacks. Ideally, the nonce used in the attestation is derived from the TLS handshake.</t>
      <t><strong>Zero-Knowledge (Optional Privacy)</strong>: The protocol should allow for selective disclosure, proving properties (e.g., "I am running patched Linux") without revealing the exact measurement hash, if desired.</t>
      <t><strong>Formal Verification</strong>: The protocol composition (TLS + Attestation) should be formally verified to ensure no security degradation (e.g., no downgrade attacks).</t>
      <t>The Upper Bound implies a tight integration where the attestation is signed over the TLS handshake state, effectively making the attestation a mandatory extension of the Finished messages.</t>
    </section>
    <section anchor="the-practical-lower-bound-of-deployment">
      <name>The Practical Lower Bound of Deployment</name>
      <t>In the real world, protocols face harsh constraints that define the "Lower Bound" of what is acceptable:</t>
      <t><strong>Middlebox Compatibility</strong>: Enterprise networks, firewalls, and TLS terminators often inspect or modify TLS handshakes. A protocol that breaks these middleboxes (e.g., by adding large custom extensions that are stripped) will fail to deploy.</t>
      <t><strong>Library Fragmentation</strong>: Not all clients and servers use the latest OpenSSL/BoringSSL. The solution must ideally be backward compatible or implementable as a modular extension.</t>
      <t><strong>Hardware Asymmetry</strong>:</t>
      <t>-High-End: Servers with TPMs 2.0 or Intel SGX/TDX can perform complex signing operations during the handshake.</t>
      <t>-Low-End: IoT devices or highly loaded servers may experience significant latency if the handshake is blocked waiting for hardware signing.</t>
      <t><strong>Operational Complexity</strong>: Verifying attestation requires a complex infrastructure (Verifier, Policy Engine). If the protocol requires the TLS server to act as the Verifier for the client, it increases server load and state management complexity.</t>
      <t><strong>Passive Observation</strong>: In some deployment models (e.g., mutual TLS), the verifier might be an offline entity analyzing logs rather than the immediate peer, requiring the attestation to be accessible post-handshake.</t>
      <t>The Lower Bound dictates that the protocol must be resilient to extension stripping, must not add unacceptable latency, and must allow for a "pass-through" mode where the TLS stack is unaware of the attestation semantics.</t>
    </section>
    <section anchor="selection-analysis">
      <name>Selection Analysis</name>
      <section anchor="the-binding-gap">
        <name>The "Binding" Gap</name>
        <t>The primary tension lies in Binding.</t>
        <t><strong>Theory</strong>: The attestation signature MUST cover the ClientHello.random and ServerHello.random.</t>
        <t><strong>Practice</strong>: Generating this signature inside the TLS state machine is difficult for many libraries.</t>
        <t><strong>Selection Decision</strong>: The group should prefer mechanisms that use the TLS Exporter [RFC5705] to bridge this gap. This allows the attestation to be generated "outside" the strict handshake code but still be cryptographically bound to the session, satisfying the upper bound while respecting the lower bound of library modularity.</t>
      </section>
      <section anchor="the-middlebox-gap">
        <name>The "Middlebox" Gap</name>
        <t><strong>Theory</strong>: We control the whole stack.</t>
        <t><strong>Practice</strong>: The path contains F5 load balancers, legacy proxies, and SaaS inspection tools.</t>
        <t><strong>Selection Decision</strong>: Sending attestation evidence as Application Data (post-handshake) is the most robust against the middlebox "lower bound." However, to mitigate the security risk of MITM stripping, the protocol MUST implement a "fallback detection" mechanism. If the client expects attestation and does not receive it within the first N bytes, it MUST abort.</t>
      </section>
      <section anchor="the-latency-gap">
        <name>The "Latency" Gap</name>
        <t><strong>Theory</strong>: Attestation is instant.</t>
        <t><strong>Practice</strong>: TPM signing takes 50ms-200ms; SGX quoting is variable.</t>
        <t><strong>Selection Decision</strong>: To prevent blocking the TLS handshake (which hurts performance), Asynchronous Attestation should be supported. The connection can be established, and data can flow (perhaps restricted), while the attestation is being validated in the background. This lowers the performance impact to the practical floor.</t>
      </section>
    </section>
    <section anchor="evaluation-of-attestation-phases">
      <name>Evaluation of Attestation Phases</name>
      <section anchor="pre-handshake-attestation">
        <name>Pre-Handshake Attestation</name>
        <ul spacing="normal">
          <li>
            <t><strong>Description</strong>: Attestation sent before TLS handshake begins.</t>
          </li>
          <li>
            <t><strong>Pros</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Allows early rejection of untrusted servers.</t>
              </li>
              <li>
                <t>Can be used in stateless environments.</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Cons</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>No cryptographic binding to TLS session.</t>
              </li>
              <li>
                <t>Vulnerable to downgrade or substitution attacks.</t>
              </li>
              <li>
                <t>Requires out-of-band channel or non-standard port.</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Verdict</strong>: Not recommended due to weak session binding.</t>
          </li>
        </ul>
      </section>
      <section anchor="intra-handshake-attestation">
        <name>Intra-Handshake Attestation</name>
        <ul spacing="normal">
          <li>
            <t><strong>Description</strong>: Attestation embedded in TLS handshake messages (e.g., via extensions or <tt>Certificate</tt>).</t>
          </li>
          <li>
            <t><strong>Pros</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Strongest security: fully bound to handshake transcript.</t>
              </li>
              <li>
                <t>Enables mutual authentication with attestation.</t>
              </li>
              <li>
                <t>No added latency.</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Cons</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>High risk of <strong>middlebox interference</strong> (e.g., stripping unknown extensions).</t>
              </li>
              <li>
                <t>Difficult to deploy on the open Internet.</t>
              </li>
              <li>
                <t>May require protocol-specific integration.</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Verdict</strong>: High security, low deployability. Suitable only in controlled environments.</t>
          </li>
        </ul>
      </section>
      <section anchor="post-handshake-attestation">
        <name>Post-Handshake Attestation</name>
        <ul spacing="normal">
          <li>
            <t><strong>Description</strong>: Attestation sent after handshake completion via application data.</t>
          </li>
          <li>
            <t><strong>Pros</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>No middlebox issues (uses standard TLS record layer).</t>
              </li>
              <li>
                <t>Easy to implement and deploy.</t>
              </li>
              <li>
                <t>Compatible with TLS 1.3 and widely deployed stacks.</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Cons</strong>:
            </t>
            <ul spacing="normal">
              <li>
                <t>Requires explicit binding to handshake (e.g., via exporter).</t>
              </li>
              <li>
                <t>Slight latency cost (one extra message).</t>
              </li>
            </ul>
          </li>
          <li>
            <t><strong>Verdict</strong>: Best balance of security and deployability.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="context-dependent-selection">
      <name>Context-Dependent Selection</name>
      <section anchor="general-internet-deployment">
        <name>General Internet Deployment</name>
        <t>For public-facing services (e.g., HTTPS, APIs), <strong>post-handshake attestation</strong> like[draft-fossati-seat-early-attestation] is REQUIRED due to widespread middlebox deployment and legacy infrastructure, and is 
recommended for broad interoperability.</t>
      </section>
      <section anchor="controlled-environments-and-integrated-protocols">
        <name>Controlled Environments and Integrated Protocols</name>
        <t>In enterprise networks, data centers, or IoT deployments, where: middleboxes are under administrative control,
TLS stacks are upgradable, and Security is paramount,
<strong>Intra-handshake attestation</strong> MAY be used when network environment allows.</t>
      </section>
      <section anchor="protocols-provide-easy-attestation-integration">
        <name>Protocols provide easy attestation integration</name>
        <t>Certain protocols, for example the LAKE Protocol [LAKE-RA], provide native support for attestation integration without requiring protocol modifications. In such cases, <strong>Intra-handshake attestation is RECOMMENDED</strong>. This approach enables zero-cost attestation, optimal cryptographic binding, and protocol-level trust composition.</t>
      </section>
      <section anchor="niche-case-pre-handshake-for-network-admission-control">
        <name>Niche Case: Pre-Handshake for Network Admission Control</name>
        <t>In architectures featuring a validating gateway (e.g., a Zero Trust Network Access gateway):</t>
        <ol spacing="normal" type="1"><li>
            <t>The client attests to the gateway via a separate protocol (e.g., EST over CoAP, or a custom UDP protocol).</t>
          </li>
          <li>
            <t>The gateway validates the attestation.</t>
          </li>
          <li>
            <t>The gateway issues a short-lived Attestation Token (e.g., a psk_identity for TLS-PSK).</t>
          </li>
          <li>
            <t>The client initiates the TLS handshake to the internal server, presenting the Token.</t>
          </li>
          <li>
            <t>The server validates the Token to authorize the session.</t>
          </li>
        </ol>
        <t>Pre-handshake attestation is RECOMMENDED for gateway-based NAC, provided the Token is cryptographically bound to the TLS session.</t>
      </section>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO</t>
    </section>
    <section anchor="references">
      <name>References</name>
      <section anchor="normative-references">
        <name>Normative References</name>
        <t><strong>[RFC8446]</strong> Rescorla, E., "The Transport Layer Security (TLS) Protocol Version 1.3", August 2018.</t>
        <t><strong>[RFC5705]</strong> Rescorla, E., "Keying Material Exporters for TLS", March 2010.</t>
        <t><strong>[RFC2119]</strong> Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, March 1997.</t>
      </section>
      <section anchor="informative-references">
        <name>Informative References</name>
        <t><strong>[draft-fossati-seat-early-attestation]</strong> draft-fossati-seat-early-attestation, Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</t>
        <t><strong>[LAKE-RA]</strong>  draft-ietf-lake-ra, Remote attestation over EDHOC</t>
      </section>
    </section>
    <section anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>TODO</t>
    </section>
  </middle>
  <back>








  </back>
  <!-- ##markdown-source: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-->

</rfc>
