Skip to main content

Secure Evidence and Attestation Transport (seat)

WG Name Secure Evidence and Attestation Transport
Acronym seat
Area Security Area (sec)
State Active
Charter charter-ietf-seat-01 Approved
Document dependencies
Additional resources Attested-TLS list archives
EXPAT BOF
Github
Initial proposed charter as SEAL
SEAL list archives
Personnel Chairs Nancy Cam-Winget, Yaroslav Rosomakho
Area Director Paul Wouters
Mailing list Address seat@ietf.org
To subscribe https://mailman3.ietf.org/mailman3/lists/seat.ietf.org/
Archive https://mailarchive.ietf.org/arch/browse/seat
Chat Room address https://zulip.ietf.org/#narrow/stream/seat

Charter for Working Group

Background and motivation

In many scenarios, particularly with the rise of Trusted Execution
Environments (TEEs) and the increasing security demands for IoT devices
and confidential workloads, there is a requirement for some use cases that
utilize protocols such as (D)TLS to also ensure that the peer's state,
expressed as Claims (for example about code, data and configurations),
is validated and when authenticating, also bound to the conventional
authentication (verification of identity).

Remote attestation (RFC9334) addresses this by allowing an entity to
produce Evidence and Attestation Results about its current state. For
example to prove that its software and firmware haven't been tampered
with. Or to prove that a secure boot method is enabled. Or to prove
that cryptographic keys are securely stored within a hardware-protected
environment.

Remote attestation bound to the authenticated TLS connection provides an
additional assurance of trustworthiness that can prevent communication
to a compromised or unauthorized system.

Scope

The Secure Evidence and Attestation Transport (SEAT) WG will document a
set of use cases that protocols such as (D)TLS should be able to support.
It will initially deliver a Standards Track protocol that meets these
use cases and enables peer or mutual attestation for (D)TLS using the
extension and/or exporter features of D(TLS). Mutual attestation will
be supported with and without client TLS authentication to faciliate
anonymous client attestation.

Such a protocol would allow an entity to produce Evidence or an
Attestation Result about itself for another party to evaluate.

Specific scoping:

  • This effort will be restricted to leveraging the (D)TLS 1.3 protocol
    and an attestation binding to a (D)TLS 1.3 connection. (D)TLS
    1.2 and older will not be supported.

  • It will leverage the existing RATS WG documents to ensure
    interoperability with existing and future attestation technologies.

  • The attested (D)TLS protocol extension will focus on attestation with TLS
    server authentication, and with or without TLS client authentication. No
    new TLS authentication mechanisms will be created.

  • The attested (D)TLS protocol extension will not modify the (D)TLS
    protocol itself. It may define (D)TLS extensions to support its goals
    but will not modify, add, or remove any existing protocol messages
    or modify the key schedule.

  • The attested D(TLS) protocol extension will also describe a minimum
    subset of properties that the attested state must convey in order
    to bind the Evidence and Attestation Results to the TLS connection.

  • The attested (D)TLS protocol extension will allow per-connection
    [freshness] (https://www.ietf.org/rfc/rfc9334.html#section-10)
    of Evidence and Attestation Results.

  • The effort will not create solutions that decrease the privacy
    or security properties of generic (D)TLS connections.

The working group will engage with the research community on the
evaluation and formal analysis of the protocol artifacts in parallel
with the specification work.

Dependencies and Liaisons

  • The working group will work closely with the TLS Working Group, the
    RATS working group, and the Confidential Computing Consortium's
    (CCC's) Attestation Special Interest Group (SIG).

  • The working group will engage with research groups regarding
    formal analysis of the working groups's resulting work.

Future work

After the initial Milestones are complete, the WG may recharter to work
on adding attestation to protocols other than (D)TLS, such as IKEv2 or
SSH, provided there is sufficient interest.

Milestones

Order Milestone Associated documents
Last A Standards Track document defining an attested (D)TLS protocol extension supporting remote peer and mutual attestation bound to the (D)TLS connection.
Next A use cases document describing the scenarios that this working group will be targeting in its specification document. This document need not be published as an RFC.