This document proposes a new "Formal Analysis Considerations" section where the authors provide a threat model, informal security goals, and a protocol diagram.
This document applies only to non-trivial extensions of TLS, which require formal analysis.