July 21, 2025
Note takers: Yaron Sheffer, Thomas Fossati
05m WG introduction - Chairs
05m Problem statement - Chairs
05m Why not RATS/TLS - Paul Wouters (AD)
10m Problem to be solved - Yaron Sheffer
10m Use cases - Thomas Fossati
10m Design Space of attested TLS - Muhammad Usama Sardar
30m Open MIC discussion - Audience
05m BOF questions - Chairs
Rem Charter and Scope discussion - Chairs
Chairs
Chairs
Paul Wouters (AD)
Yaron Sheffer
Dave Thaler: what's the expected lifetime of the attestation
Stephen Ferrell: Who is the relying party.
Britta Hale: What is being attested? Are you authenticating the
connection
Thomas Fossati
No questions.
Muhammad Usama Sardar
Richard Barnes: is timing really important (for attestation)? Once
the security properties are established, there can be no change
later unless the TEE is rogue. So pre-handshake may be sufficient.
Eric Rescola - trying to understand timing; don't understand what
the guarantees mean. Understand idea of attesting to the old
firmware before the update but not during the...it's related to the
freshness of the evidence
Uri - want end2end security, but there are debates about proxies:
there's either end2end security or you dont. With limitations to the
post-attestation, application layer is not a limitation but a
requirement
Hannes: thought about RATs, how attestations work. Looking at
communications between client and server, don't know the
software or hardware running and RATs helps. For some of the use
cases, it's to allow programs to establish a secure channel
between two peers which is also the promise of confidential
computing.
Laurence: attestation of the client was the initial motivation
for the RATs work, scoped to user devices. There are a bunch of
use cases that are interesting, maybe engage with the browser
vendors?
Paul W: I understand the proponents want to allow for peer or
mutual peer attestation is in scope
Laurence: In EAT we looked at privacy angle and we have some
solutions
Watson: admin permissions must be extremely narrow
Usama/Thomas: yes
Mark Novak: concerns:
Nancy: we are trying to understand whether there is a problem to
address
Chairs Poll 1:
Raise your hand if you believe this problem is well defined enough for
the IETF to consider solving? Don't raise your hand if the problem
isn't well defined.
51 Yes
10 No
16 No opinion
Chairs Poll 2:
Raise your hand if you feel this problem is solvable, or don't raise
your hand if you believe this problem isn't solvable.
53 Yes
2 No
21 No opinion
Chairs Poll 3:
Who is willing to work on the problem?
28 Yes
14 No
20 No opinion
Dave Thaler (chat): A statement from CCC about the companies
[interested] would indeed be useful
Background and motivation
Ben Schwartz:
there is not agreement about whether it's post-TLS yet, and the
charter should say it's going to tie to TLS
Ben: support existing pre-standard technologies where possible
EKR: key resrictions are no change to TLS and to use post-handshake