<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.1 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-davidben-tls13-pkcs1-01" category="exp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.1 -->
  <front>
    <title abbrev="Legacy PKCS#1 codepoints for TLS 1.3">Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-davidben-tls13-pkcs1-01"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Popov" fullname="Andrei Popov">
      <organization>Microsoft Corp.</organization>
      <address>
        <email>andreipo@microsoft.com</email>
      </address>
    </author>
    <date year="2023" month="October" day="17"/>
    <abstract>
      <?line 76?>

<t>This document allocates code points for the use of RSASSA-PKCS1-v1_5 with
client certificates in TLS 1.3. This removes an obstacle for some deployments
to migrate to TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidben.github.io/tls13-pkcs1/draft-davidben-tls13-pkcs1.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-davidben-tls13-pkcs1/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidben/tls13-pkcs1"/>.</t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.3 <xref target="RFC8446"/> removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in
CertificateVerify messages in favor of RSASSA-PSS. While RSASSA-PSS is a
long-established signature algorithm, some legacy hardware cryptographic devices
lack support for it. While uncommon in TLS servers, these devices are sometimes
used by TLS clients for client certificates.</t>
      <t>For example, Trusted Platform Modules (TPMs) are ubiquitous hardware
cryptographic devices that are often used to protect TLS client certificate
private keys. However, a large number of TPMs are unable to produce RSASSA-PSS
signatures compatible with TLS 1.3. TPM specifications prior to 2.0 did not
define RSASSA-PSS support (see Section 5.8.1 of <xref target="TPM12"/>). TPM 2.0
includes RSASSA-PSS, but only those TPM 2.0 devices compatible with FIPS 186-4
can be relied upon to use the salt length matching the digest length, as
required for compatibility with TLS 1.3 (see Appendix B.7 of <xref target="TPM2"/>).</t>
      <t>TLS connections that rely on such devices cannot migrate to TLS 1.3. Staying on
TLS 1.2 leaks the client certificate to network attackers and additionally
prevents such deployments from protecting traffic against retroactive
decryption by an attacker with a quantum computer.</t>
      <t>Moreover, TLS negotiates the protocol version before client certificates, so
clients and servers cannot smoothly transition unaffected connections to
TLS 1.3. As a result, this issue is not limited to individual connections
that use affected devices. It prevents entire deployments from migrating to
TLS 1.3. See <xref target="security-considerations"/> for further discussion.</t>
      <t>This document allocates code points to use these legacy keys with client
certificates in TLS 1.3.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="pkcs1-v15-signaturescheme-types">
      <name>PKCS#1 v1.5 SignatureScheme Types</name>
      <t>The following SignatureScheme values are defined for use with TLS 1.3.</t>
      <artwork><![CDATA[
    enum {
        rsa_pkcs1_sha256_legacy(0x0420),
        rsa_pkcs1_sha384_legacy(0x0520),
        rsa_pkcs1_sha512_legacy(0x0620),
    } SignatureScheme;
]]></artwork>
      <t>The above code points indicate a signature algorithm using RSASSA-PKCS1-v1_5
<xref target="RFC8017"/> with the corresponding hash algorithm as defined in
<xref target="SHS"/>. They are only defined for signatures in
the client CertificateVerify message and are not defined for use in other
contexts. In particular, servers intending to advertise support for
RSASSA-PKCS1-v1_5 signatures in the certificates themselves should use the
<tt>rsa_pkcs1_*</tt> constants defined in <xref target="RFC8446"/>.</t>
      <t>Clients MUST NOT advertise these values in the <tt>signature_algorithms</tt> extension
of the ClientHello. They MUST NOT accept these values in the server
CertificateVerify message.</t>
      <t>Servers that wish to support clients authenticating with legacy
RSASSA-PKCS1-v1_5-only keys MAY send these values in the
<tt>signature_algorithms</tt> extension of the CertificateRequest message and accept
them in the client CertificateVerify message. Servers MUST NOT accept these code
points if not offered in the CertificateRequest message.</t>
      <t>Clients with such legacy keys MAY negotiate the use of these signature
algorithms if offered by the server.  Clients SHOULD NOT negotiate them with
keys that support RSASSA-PSS.</t>
      <t>TLS implementations SHOULD disable these code points by default.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to this document, legacy RSA keys would prevent client certificate
deployments from adopting TLS 1.3. The new code points allow such deployments
to upgrade without replacing the keys. TLS 1.3 fixes a privacy flaw
<xref target="PRIVACY"/> with client certificates, so
upgrading is a particular benefit to these deployments. TLS 1.3 is also a
prequisite for post-quantum key exchanges <xref target="I-D.ietf-tls-hybrid-design"/>,
necessary for deployments to protect traffic against retroactive decryption by
an attacker with a quantum computer.</t>
      <t>Additionally, TLS negotiates protocol versions before client certificates.
Clients send ClientHellos without knowing whether the server will request to
authenticate with legacy keys. Conversely, servers respond with a TLS
version and CertificateRequest without knowing if the client will then
respond with a legacy key. If the client and server, respectively, offer and
negotiate TLS 1.3, the connection will fail due to the legacy key, when it
previously succeeded at TLS 1.2.</t>
      <t>To recover from this failure, one side must globally disable TLS 1.3 or the
client must implement an external fallback. Disabling TLS 1.3 impacts
connections that would otherwise be unaffected by this issue, while external
fallbacks break TLS's security analysis and may introduce vulnerabilities
<xref target="POODLE"/>. The new code points reduce the pressure on implementations to select
one of these problematic mitigations and unblocks TLS 1.3 deployment.</t>
      <t>At the same time, the new code points also reduce the pressure on
implementations to migrate to RSASSA-PSS. The above considerations do not apply
to server keys, so these new code points are forbidden for use with server
certificates. RSASSA-PSS continues to be required for TLS 1.3 servers using RSA
keys. This minimizes the impact to only those cases necessary to unblock TLS
1.3 deployment.</t>
      <t>Finally, when implemented incorrectly, RSASSA-PKCS1-v1_5 admits signature
forgeries <xref target="MFSA201473"/>. Implementations  producing or verifying signatures
with these algorithms MUST implement RSASSA-PKCS1-v1_5 as specified in section
8.2 of <xref target="RFC8017"/>. In particular, clients MUST include the mandatory NULL
parameter in the DigestInfo structure and produce a valid DER <xref target="X690"/>
encoding. Servers MUST reject signatures which do not meet these requirements.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entries in the
TLS SignatureScheme registry, defined in <xref target="RFC8446"/>. The "Recommended" column
should be set to "N", and the "Reference" column should be set to this document.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0420</td>
            <td align="left">
              <tt>rsa_pkcs1_sha256_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0520</td>
            <td align="left">
              <tt>rsa_pkcs1_sha384_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0620</td>
            <td align="left">
              <tt>rsa_pkcs1_sha512_legacy</tt></td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2002"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
        </reference>
        <reference anchor="TPM12" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">
          <front>
            <title>TPM Main Specification Level 2 Version 1.2, Revision 116, Part 2 - Structures of the TPM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2011" month="March" day="01"/>
          </front>
        </reference>
        <reference anchor="TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59, Part 1: Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November" day="08"/>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SHS">
          <front>
            <title>Secure Hash Standard</title>
            <author fullname="Quynh H. Dang" initials="Q." surname="Dang">
              <organization/>
            </author>
            <date month="July" year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MFSA201473" target="https://www.mozilla.org/en-US/security/advisories/mfsa2014-73/">
          <front>
            <title>RSA Signature Forgery in NSS</title>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <date year="2014" month="September" day="23"/>
          </front>
        </reference>
        <reference anchor="POODLE" target="https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">
          <front>
            <title>This POODLE bites: exploiting the SSL 3.0 fallback</title>
            <author initials="B." surname="Moeller" fullname="Bodo Moeller">
              <organization/>
            </author>
            <date year="2014" month="October" day="14"/>
          </front>
        </reference>
        <reference anchor="PRIVACY">
          <front>
            <title>Push away your privacy: Precise user tracking based on TLS client certificate authentication</title>
            <author fullname="Matthias Wachs" initials="M." surname="Wachs">
              <organization/>
            </author>
            <author fullname="Quirin Scheitle" initials="Q." surname="Scheitle">
              <organization/>
            </author>
            <author fullname="Georg Carle" initials="G." surname="Carle">
              <organization/>
            </author>
            <date month="June" year="2017"/>
          </front>
          <seriesInfo name="2017 Network Traffic Measurement and Analysis Conference" value="(TMA)"/>
          <seriesInfo name="DOI" value="10.23919/tma.2017.8002897"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="September" year="2023"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
