<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-xia-rats-key-negotiation-integration-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="RATS Key Negotiation Integration">Integration of Remote Attestation with Key Negotiation and Key Distribution mechanisms</title>
    <seriesInfo name="Internet-Draft" value="draft-xia-rats-key-negotiation-integration-01"/>
    <author initials="L." surname="Xia" fullname="Liang Xia">
      <organization>Huawei Technologies</organization>
      <address>
        <email>frank.xialiang@huawei.com</email>
      </address>
    </author>
    <author initials="W." surname="Jiang" fullname="Weiyu Jiang">
      <organization>Huawei Technologies</organization>
      <address>
        <email>jiangweiyu1@huawei.com</email>
      </address>
    </author>
    <author initials="M. U." surname="Sardar" fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <author initials="H." surname="Birkholz" fullname="Henk Birkholz">
      <organization>Fraunhofer SIT</organization>
      <address>
        <email>henk.birkholz@ietf.contact</email>
      </address>
    </author>
    <author initials="J." surname="Zhang" fullname="Jun Zhang">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <email>junzhang1@huawei.com</email>
      </address>
    </author>
    <author initials="H." surname="Labiod" fullname="Houda Labiod">
      <organization>Huawei Technologies France S.A.S.U.</organization>
      <address>
        <email>houda.labiod@huawei.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>Remote ATtestation ProcedureS</workgroup>
    <keyword>RATS</keyword>
    <keyword>attestation</keyword>
    <keyword>key negotiation</keyword>
    <abstract>
      <?line 65?>

<t>This draft proposes a lightweight security enhancement scheme based on integration of remote attestation with key negotiation and key distribution. Correctly integrating the main steps of end-to-end key negotiation into the remote attestation process may provide more security and flexibility.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-xia-rats-key-negotiation-integration/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Remote ATtestation ProcedureS Working Group mailing list (<eref target="mailto:rats@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/rats/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/rats/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-rats/draft-xia-rats-key-negotiation-integration"/>.</t>
    </note>
  </front>
  <middle>
    <?line 69?>

<section anchor="intro">
      <name>Introduction</name>
      <t>Remote attestation is a security mechanism based on trusted hardware (e.g., TPM, TEE) to allow remote verifiers to cryptographically verify the integrity of the target device's software configuration, hardware state, and runtime environment.
Therefore, remote attestation can effectively demonstrate the overall security status of endpoints in a communication.
Secure channel protocols (e.g., TLS, QUIC, IPSec and SSH) establish end-to-end (E2E) secure channels based on the authentication of the endpoint's legitimate identity and secure key negotiation, thereby ensuring the security of network communication.
Combining remote attestation protocols with secure channel protocols correctly and establishing cryptographic binding between them achieves a logical binding of endpoint security and network security. This ensures dual verification and protection of the endpoint's identity and state in secure connections. Attested TLS <xref target="I-D.fossati-tls-attestation"/> <xref target="I-D.fossati-tls-exported-attestation"/> is currently important related work in the industry. Other similar works include binding remote attestation with credential issuance (e.g., certificates <xref target="I-D.ietf-lamps-csr-attestation"/>, OAuth tokens, etc.) to enhance security.</t>
      <t>However, in some scenarios, the above binding may not be possible.
For example:</t>
      <ul spacing="normal">
        <li>
          <t>Scenario 1: When tenants in a public cloud/compute cluster deploy workloads, they need to first verify the security of their runtime environment through remote attestation before requesting the Key Management Service (KMS) to assign application-layer data keys to the virtual machine (VM)/compute node on which the workload is running.
These keys are then used for application-layer data encryption, such as file encryption or disk encryption, rather than for any secure channel protocols.
For example, to protect AI/ML model parameters from leakage and tampering, for example, model weights and other parameters must be encrypted before transmiting and loading the model to a Trusted Execution Environment (TEE) to ensure that only the TEE with the right the key can decrypts it.</t>
        </li>
        <li>
          <t>Scenario 2: The end user/client accesses the online TEE computing environment, submits their data for business processing or large model inference and must ensure the security of the entire computing environment through remote attestation before establishing a secure connection.
There are multiple options for the secure channel protocol that can be established for this use case, such as TLS, IPSec, QUIC and OHTTP.
The user may only need to complete end-to-end (E2E) key negotiation based on remote attestation.
The negotiated key can be used for various implementation methods, depending on which secure protocol or application layer encryption is used.</t>
        </li>
        <li>
          <t>Scenario 3: A company intends to deploy its private large model or file system in the trusted execution environment (TEE) of a public cloud platform. In order to keep the deployed content confidential, the company first uploads the encrypted objects to the cloud platform. It then conducts a security check on the cloud platform's TEE using remote attestation. Once this has been passed, the decryption key is sent to decrypt the uploaded objects inside the TEE.</t>
        </li>
      </ul>
      <t>In summary, this draft introduces the idea of integrating remote attestation and security mechanisms like key negotiation and key distribution to build less complex, lightweight and enhanced security schemes. More precisely, the combination of both attestation and security mechanisms brings the followings benefits::</t>
      <ul spacing="normal">
        <li>
          <t>The key distribution of KMS or E2E key negotiation can be completed automatically based on remote attestation, thereby improving the security of key negotiation.</t>
        </li>
        <li>
          <t>The automatically negotiated keys can be flexibly applied in various ways, whether for secure protocols or application layer encryption.</t>
        </li>
        <li>
          <t>Compared to the complete and systematic implementation of Attested TLS, a more lightweight implementation can be provided.</t>
        </li>
      </ul>
      <section anchor="use-of-negotiated-keys-in-different-security-protocols">
        <name>Use of Negotiated Keys in Different Security Protocols</name>
        <t>If the negotiated key is used for application-layer encryption, its usage is closely tied to the application and can be highly flexible.
When the key is used for security protocols such as TLS and IPsec, there are various ways to integrate and utilise it within the protocol:</t>
        <ul spacing="normal">
          <li>
            <t>TLS: The negotiated key can be used as a pre-shared key for subsequent TLS handshakes, or as an externally imported shared key for TLS hybrid key exchange <xref target="I-D.ietf-tls-hybrid-design"/>.  Integrating all these pre-shared keys into the TLS protocol can be achieved through the hybrid authentication mode of TLS_CERT_WITH_EXTERN_PSK. This approach not only implements a mutual authentication using the pre-shared key/SK and the server certificate/attester's identity but also verifies the binding relationship between the SK and the attester's identity.  If the server certificate obtained during the TLS negotiation cannot be correctly bound to the currently used pre-shared key, the TLS negotiation will terminate.</t>
          </li>
          <li>
            <t>IPsec: The negotiated key can be used as a pre-shared key for subsequent IKEv2 handshakes, or as Post-quantum Preshared Keys (PPKs) <xref target="RFC8784"/> to be used in the IPsec protocol. Similar to TLS, the IKEv2 hybrid authentication mode using pre-shared keys and certificates achieves mutual authentication and ensures the correctness of the binding relationship between the two.</t>
          </li>
        </ul>
      </section>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
        <?line -18?>

</section>
    </section>
    <section anchor="integration-scheme">
      <name>Integration Scheme</name>
      <t>The current specification is based on passport model of RATS. Future versions of specification will include the background-check model.</t>
      <section anchor="public-cloud-kms-key-distribution-integrated-with-remote-attestation">
        <name>Public Cloud KMS Key Distribution Integrated with Remote Attestation</name>
        <t>The Key Management Service (KMS) for public cloud networks includes the root of trust, secure channels between Attester (node, VM, container, service, application) and the KMS, full lifecycle management of keys (including key generation, storage, rotation, and destruction), hierarchical encryption architecture (such as Envelope Encryption), and access control mechanisms. Specifically:</t>
        <ul spacing="normal">
          <li>
            <t>The basic process for symmetric key distribution and usage is as follows: When an application requires data to be encrypted and shared, it requests the KMS to distribute the DEK (Data Encryption Key) and the EDEK (Encrypted DEK, encrypted using the Customer Master Key (CMK) ) to the application via an API. The application then encrypts the data using the DEK, deletes the DEK from memory, and sends the encrypted ciphertext along with the EDEK to the receiving application. The receiving application then requests the KMS to decrypt the EDEK via an API, retrieves the DEK to decrypt the data, and then deletes the DEK from memory.</t>
          </li>
          <li>
            <t>The basic process of asymmetric key distribution and usage is as follows: When an application needs to encrypt data, it requests the KMS to generate a public-private key pair via an API, and then uses the obtained public key to encrypt the data. The encrypted ciphertext is then sent to the receiving application. The receiving application calls the KMS's decryption API and the KMS uses the corresponding private key internally to decrypt the data and return the plaintext to the receiving application. The private key never leaves the KMS.When an application requires digital signing of data, it requests the KMS to generate a public–private key pair via an API. The public key is then distributed to all parties that need to verify the signature. The application then requests the KMS to sign the data using the corresponding private key via an API, and sends the signature result along with the data to the receiving application. The receiving application uses the public key to verify the signature.</t>
          </li>
        </ul>
        <t>In summary, KMS provides the applications with the required deliverables, which include application-layer encryption/authentication, symmetric/asymmetric keys, decrypted plaintext and calculated signatures. For simplicity, the term 'keys' is used here to refer to all these deliverables.</t>
        <t>The following diagram shows the method of integrating key distribution into the remote attestation interaction Passport Model process:</t>
        <figure anchor="fig-rats-key-negotiation-integration-cloud-kms">
          <name>Public Cloud KMS Key Distribution Integrated Scheme on Passport Model of RATS</name>
          <artwork><![CDATA[
            .------------.
            |            | 2. Compare Evidence
            |  Verifier  | against appraisal policy
            |            |
            '--------+---'
                ^    |
  1. Evidence + |    | 3. Attestation
  Attester's    |    | Result + Attester's identity
  identity      |    v
            .---+--------.                .-------------.
            |            +--------------->|   Relying   | 5. Compare Attestation
            |  Attester  |4. Attestation  |    Party    | Result against
            |            |   Result +     |    & KMS    | appraisal policy
            '------------' Attester's     '-------------' + Distribute Keys
                           identity                         with Attester's public key

]]></artwork>
        </figure>
        <t>In the standard remote attestation process described above, the Attester, which is an application in TEE, can request the Attester's application layer keys after providing its attestation result to the KMS. By including the attester's identity (raw public key or certificate) in the messages throughout the remote attestation process and having the attester (using its attestation evidence signing key) and verifier (using its attestation result signing key) endorse and sign it, a key binding mechanism between the attester's attestation result and its identity is implemented. Subsequently, the KMS can use the identity's public key for key distribution, ensuring that the keys are distributed to the correct attester, thereby eliminating the risk of diversion attacks. During key rotation, the KMS can proactively trigger this process to update and rotate the new and old keys.</t>
        <t>Overall, the above approach integrates end-to-end key distribution correctly into the remote attestation process, achieving automation of key distribution and higher security guarantees based on the security of attester endpoint.</t>
      </section>
      <section anchor="integrating-e2e-key-negotiation-into-remote-attestation">
        <name>Integrating E2E Key Negotiation Into Remote Attestation</name>
        <t>The current main implementation mechanism for E2E key negotiation is Diffie-Hellman Ephemeral (DHE) and Elliptic-Curve Diffie-Hellman Ephemeral (ECDHE). Taking ECDHE as an example, the method of integrating it into remote attestation passport Model process is shown in the following figure:</t>
        <figure anchor="fig-rats-key-negotiation-integration-e2e">
          <name>Integrating E2E Key Negotiation Into Remote Attestation Passport Model Interaction</name>
          <artwork><![CDATA[
           .------------.
           |            | 4. Compare Evidence
           |  Verifier  | against appraisal policy
           |            |
           '--------+---'
 3. Evidence + ^    |
    pubS +     |    |5. Attestation
    Attester's |    | Result + pubS + Attester's identity
    identity   |    v     1. Attestation
          .---+--------. Request + pubC.-------------.
          |  Attester  <-------------->|   Relying   | 7. Compare Attestation
          |  & Server  | 6.Attestation |    Party    | Result against
          |            | Result        |    & Client | appraisal policy
          '------------' + pubS        '-------------' + SK = privC * pubS
  2. SK = privS * pubC   + Attester's                  + store the mapping of SK
                           identity                      with Attester's identity
SK：Symmetric Key
(privC,pubC): Client's ECDHE key pair
(privS,pubS): Server's ECDHE key pair
]]></artwork>
        </figure>
        <t>In the standard remote attestation process described above,the Client includes the public key (pubC) from its dynamically generated ECDHE key pair (privC, pubC) in the remote attestation request message while retaining the private key (privC).
Upon receiving pubC, the Server can compute the symmetric key SK using its private key privS from its dynamically generated ECDHE key pair (privS, pubS).
At the same time, by including the Attester's identity (raw public key or certificate) in all subsequent messages of the remote attestation process and having the Attester (using its attestation evidence signing key) and Verifier (using its attestation result signing key) endorse and sign it, a key binding mechanism between the Attester's attestation result and its identity is implemented, thereby eliminating the risk of diversion attacks.
After completing the remote attestation with the Verifier, the Server includes its pubS in the attestation result returned to the Client.
Once the Client has verified the attestation result, it can compute the symmetric key SK using pubS and its own private key privC, thereby completing both the remote attestation and the ECDHE key agreement. The Client can also record the relationship between the generated SK and the corresponding Attester's identity. This ensures that the SK is subsequently used to establish a secure protocol connection with an Attester possessing the correct identity.
Some of the metadata negotiated alongside the key exchange materials includes the session ID, nonce and algorithm.</t>
        <t>Overall, the above approach integrates end-to-end key negotiation correctly into the remote attestation process, achieving automation of key negotiation and higher security guarantees based on the security of attester endpoint.</t>
      </section>
      <section anchor="enterprise-customer-key-distribution-to-public-cloud-into-remote-attestation">
        <name>Enterprise Customer Key Distribution to Public Cloud Into Remote Attestation</name>
        <t>Enterprises need to deploy data assets, such as data, applications and systems, on public clouds. Some of these assets are critical to the enterprise, such as large private model applications. It is therefore essential to ensure the trustworthiness and security of the operating environment. The process involves first uploading the encrypted data assets to the cloud environment and then performing remote attestation on the operating environment. Once the operating environment passes the security verification, the decryption key is distributed to it for loading and running the decrypted data assets. In fact, the key here can also be generalized to refer to the decrypted plaintext and the calculated signatures provided by Enterprise KMS. This scenario is similar to the public cloud KMS key distribution scenario, except that the public cloud is no longer responsible for key distribution. Instead, the enterprise manages the keys itself and completes the key distribution after passing the security verification through remote attestation. The method is illustrated in the following diagram:</t>
        <figure anchor="fig-rats-key-negotiation-integration-enterprise-kms">
          <name>Enterprise KMS Key Distribution Integrated with Remote Attestation Passport Model Interaction</name>
          <artwork><![CDATA[
            .------------.
            |            | 2. Compare Evidence
            |  Verifier  | against appraisal policy
            |            |
            '--------+---'
                ^    |
  1. Evidence + |    | 3. Attestation
  Attester's    |    | Result + Attester's identity
  identity      |    v
            .---+--------.                .-------------.
            |            +--------------->|Relying Party| 5. Compare Attestation
            |  Attester  |4. Attestation  |& Enterprise | Result against
            |            |   Result +     |      KMS    | appraisal policy
            '------------' Attester's     '-------------' + Distribute Keys
                           identity                         with Attester's public key

]]></artwork>
        </figure>
        <t>By including the Attester's identity (raw public key or certificate) in the messages throughout the remote attestation process and having the Attester (using its attestation evidence signing key) and Verifier (using its attestation result signing key) endorse and sign it, a key binding mechanism between the attester's attestation result and its identity is implemented. Subsequently, the enterprise KMS can use the identity's public key for key distribution, ensuring that the keys are distributed to the correct attester, thereby eliminating the risk of diversion attacks. During key rotation, the enterprise KMS can proactively trigger this process to update and rotate of the new and old keys.</t>
        <t>Overall, the above approach integrates end-to-end key distribution correctly into the remote attestation process, achieving automation of key distribution and higher security guarantees based on the security of attester endpoint.</t>
      </section>
    </section>
    <section anchor="remote-attestation-protocol-and-message-extensions">
      <name>Remote Attestation Protocol and Message Extensions</name>
      <t>This section describes how to extend RATS protocol and message to incorporate key negotiation into the remote attestation process.</t>
      <t>TBD</t>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <t>// RFC Editor: please remove this section prior to publication.
This section records the status of known implementations of the protocol defined by this specification at the time of posting of this Internet-Draft, and is based on a proposal described in <xref target="RFC7942"/>. The description of implementations in this section is intended to assist the IETF in its decision processes in progressing drafts to RFCs.  Please note that the listing of any individual implementation here does not imply endorsement by the IETF.  Furthermore, no effort has been spent to verify the information presented here that was supplied by IETF contributors.  This is not intended as, and must not be construed to be, a catalog of available implementations or their features.  Readers are advised to note that other implementations may exist.</t>
      <t>According to <xref target="RFC7942"/>, "this will allow reviewers and working groupsto assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature. It is up to the individual working groups to use this information as they see fit".</t>
      <section anchor="trustee">
        <name>Trustee</name>
        <t>Responsible Organisation: Trustee (open source project within the Confidential Containers).</t>
        <t>Location: https://github.com/confidential-containers/trustee</t>
        <t>Description: 
Trustee contains tools and components for attesting confidential guests and providing secrets to them. Collectively, these components are known as Trustee. Trustee typically operates on behalf of the guest owner and interact remotely with guest components. Trustee components include:
- Key Broker Service: The KBS is a server that facilitates remote attestation and secret delivery. Its role is similar to that of the Relying Party in the RATS model;
- Attestation Service: The AS verifies TEE evidence. In the RATS model this is a Verifier;
- Reference Value Provider Service: The RVPS manages reference values used to verify TEE evidence;
- KBS Client Tool: This is a simple tool which can be used to test or configure the KBS and AS.</t>
        <t>There are two main ways to deploy Trustee: with Docker Compose, on Kubernetes.</t>
        <t>Level of Maturity: This is a proof-of-concept prototype implementation.</t>
        <t>License: Apache-2.0.</t>
        <t>Coverage: This implementation covers most of the aspects of the use case 1 and 3 of this draft.</t>
        <t>Contact: Ding Ma, xynnn@linux.alibaba.com</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Evidence should be cryptographically bound to the identifier provided to the machine by the infrastructure provider to prevent diversion attacks <xref target="Meeting-122-TLS-Slides"/>.</t>
    </section>
    <section anchor="privacy-considerations">
      <name>Privacy Considerations</name>
      <t>TBD</t>
    </section>
    <section anchor="optimization-considerations">
      <name>Optimization Considerations</name>
      <t>For the first time connection between the Attester and the Relying Party, embedding the raw public key/certificate inside the Attestation Result is necessary as it simplifies the procedure to delivery of the raw pulbic key/cerficate from the Attester. For the latter connection between this Atterster and the Relying Party, if the raw public key/certificate remains unchanged, the Attester May choose to use the hash of its raw public key/cerficate instead for the Evidence/Attestation Result between itself and the Verifier, and only forward the Attestation Result that contains the hash of hash of its raw public key/cerficate. At the Relying Party side, it compares this hash with the hash of the local cached raw public key/cerficate, and use the corresponding raw public key/cerficate for this session when it matches. This will reduce the payload carried by the Evidence and the Attestation Result.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8784">
          <front>
            <title>Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security</title>
            <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
            <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
            <date month="June" year="2020"/>
            <abstract>
              <t>The possibility of quantum computers poses a serious challenge to cryptographic algorithms deployed widely today. The Internet Key Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a quantum computer is available. It is anticipated that IKEv2 will be extended to support quantum-secure key exchange algorithms; however, that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a quantum computer by using preshared keys.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8784"/>
          <seriesInfo name="DOI" value="10.17487/RFC8784"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.fossati-tls-attestation">
          <front>
            <title>Using Attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
         </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Paul Howard" initials="P." surname="Howard">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>Arm Limited</organization>
            </author>
            <author fullname="Arto Niemi" initials="A." surname="Niemi">
              <organization>Huawei</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <date day="30" month="April" year="2025"/>
            <abstract>
              <t>   The TLS handshake protocol allows authentication of one or both peers
   using static, long-term credentials.  In some cases, it is also
   desirable to ensure that the peer runtime environment is in a secure
   state.  Such an assurance can be achieved using attestation which is
   a process by which an entity produces evidence about itself that
   another party can use to appraise whether that entity is found in a
   secure state.  This document describes a series of protocol
   extensions to the TLS 1.3 handshake that enables the binding of the
   TLS authentication key to a remote attestation session.  This enables
   an entity capable of producing attestation evidence, such as a
   confidential workload running in a Trusted Execution Environment
   (TEE), or an IoT device that is trying to authenticate itself to a
   network access point, to present a more comprehensive set of security
   metrics to its peer.  These extensions have been designed to allow
   the peers to use any attestation technology, in any remote
   attestation topology, and mutually.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-attestation-09"/>
        </reference>
        <reference anchor="I-D.fossati-tls-exported-attestation">
          <front>
            <title>Remote Attestation with Exported Authenticators</title>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Muhammad Usama Sardar" initials="M. U." surname="Sardar">
              <organization>TU Dresden</organization>
            </author>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Ionuț Mihalcea" initials="I." surname="Mihalcea">
              <organization>Arm Limited</organization>
            </author>
            <date day="3" month="July" year="2025"/>
            <abstract>
              <t>   This specification defines a method for two parties in a
   communication interaction to exchange Evidence and Attestation
   Results using exported authenticators, as defined in RFC 9261.
   Additionally, it introduces the cmw_attestation extension, which
   allows attestation credentials to be included directly in the
   Certificate message sent during the Exported Authenticator-based
   post-handshake authentication.  The approach supports both the
   passport and background check models from the RATS architecture while
   ensuring that attestation remains bound to the underlying
   communication channel.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-fossati-tls-exported-attestation-02"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-csr-attestation">
          <front>
            <title>Use of Remote Attestation with Certification Signing Requests</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>Siemens</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="5" month="October" year="2025"/>
            <abstract>
              <t>   A PKI end entity requesting a certificate from a Certification
   Authority (CA) may wish to offer trustworthy claims about the
   platform generating the certification request and the environment
   associated with the corresponding private key, such as whether the
   private key resides on a hardware security module.

   This specification defines an attribute and an extension that allow
   for conveyance of RATS conceptual messages (see Section 8 of
   [RFC9334], such as Evidence, Endorsements and Attestation Results, in
   Certificate Signing Requests (CSRs), such as PKCS#10 or Certificate
   Request Message Format (CRMF) payloads.  This provides an elegant and
   automatable mechanism for transporting attestation data to a
   Certification Authority.

   Including Evidence, Endorsements and Attestation Results along with a
   CSR can help to improve the assessment of the security posture for
   the private key, and can help the Certification Authority to assess
   whether it satisfies the requested certificate profile.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-csr-attestation-21"/>
        </reference>
        <reference anchor="Meeting-122-TLS-Slides" target="https://datatracker.ietf.org/meeting/122/materials/slides-122-tls-identity-crisis-00">
          <front>
            <title>Identity Crisis in Attested TLS for Confidential Computing</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
