<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.20 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-jose-deprecate-none-rsa15-00" category="std" consensus="true" submissionType="IETF" updates="7518" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title>JOSE: Deprecate 'none' and 'RSA1_5'</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-jose-deprecate-none-rsa15-00"/>
    <author fullname="Neil Madden">
      <organization>Illuminated Security Ltd</organization>
      <address>
        <email>neil@illuminated-security.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="03"/>
    <area>Security</area>
    <workgroup>Javascript Object Signing and Encryption</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 56?>

<t>This draft updates <xref target="RFC7518"/> to deprecate the JWS algorithm "none" and the JWE algorithm
"RSA1_5". These algorithms have known security weaknesses.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://NeilMadden.github.io/jose-deprecate-none-rsa1_5/draft-ietf-jose-deprecate-none-rsa15.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-jose-deprecate-none-rsa15/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Javascript Object Signing and Encryption Working Group mailing list (<eref target="mailto:jose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/jose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/jose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NeilMadden/jose-deprecate-none-rsa1_5"/>.</t>
    </note>
  </front>
  <middle>
    <?line 61?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>JSON Web Algorithms (JWA, <xref target="RFC7518"/>) introduced several standard algorithms for both JSON Web
Signature (JWS) and JSON Web Encryption (JWE). Many of these algorithms have stood the test of time
and are still in widespread use. However, some algorithms have proved to be difficult to implement
correctly leading to exploitable vulnerabilities. This draft deprecates two such algorithms:</t>
      <ul spacing="normal">
        <li>
          <t>The JWS "none" algorithm, which indicates that no security is applied to the message at all.</t>
        </li>
        <li>
          <t>The JWE "RSA1_5" algorithm, which indicates RSA encryption with PKCS#1 version 1.5 padding.</t>
        </li>
      </ul>
      <t>Note that RSA signatures using PKCS#1 version 1.5 padding (<tt>RS256</tt>, <tt>RS384</tt>, and <tt>RS512</tt>) are
unchanged by this specification and can still be used.</t>
      <section anchor="the-none-algorithm">
        <name>The 'none' algorithm</name>
        <t>The "none" algorithm creates an Unsecured JWS, whose contents are completely unsecured as the name
implies. Despite strong guidance in the original RFC around not accepting Unsecured JWS by default,
many implementations have had serious bugs due to accepting this algorithm. In some cases, this has
led to a complete loss of security as authenticity and integrity checking can be disabled by an
adversary simply by changing the algorithm ("alg") header in the JWS. The website <xref target="howmanydays"/>
tracks public vulnerabilities due to implementations mistakenly accepting the "none" algorithm. It
currently lists 12 reports, many of which have high impact ratings. The following is a partial list
of issues known to have been caused by misuse of the "none" algorithm, with a Common Vulnerability
Enumeration <xref target="CVE"/> identifier, and a Common Vulnerability Scoring System <xref target="CVSS"/> score
indicating the severity of the impact:</t>
        <ul spacing="normal">
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2018-1000531">CVE-2018-1000531</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2017-10862">CVE-2017-10862</eref> - CVSS: 5.3 (Medium)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2022-23540">CVE-2022-23540</eref> - CVSS: 7.6 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2020-15957">CVE-2020-15957</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29500">CVE-2021-29500</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29451">CVE-2021-29451</eref> - CVSS: 9.1 (Critical)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29455">CVE-2021-29455</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-22160">CVE-2021-22160</eref> - CVSS: 9.8 (Critical)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-32631">CVE-2021-32631</eref> - CVSS: 6.5 (Medium)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2023-29357">CVE-2023-29357</eref> - CVSS: 9.8 (Critical)</t>
          </li>
        </ul>
        <t>Many other vulnerabilities have been reported without an accompanying CVE, which we do not list here.</t>
        <t>Although there are some legitimate use-cases for Unsecured JWS, these are relatively few in number
and can easily be satisfied by alternative means. The small risk of breaking
some of these use-cases is far outweighed by the improvement in security for the majority of
JWS users who may be impacted by accidental acceptance of the "none" algorithm.</t>
      </section>
      <section anchor="the-rsa15-algorithm">
        <name>The 'RSA1_5' algorithm</name>
        <t>The "RSA1_5" algorithm implements RSA encryption using PKCS#1 version 1.5 padding <xref target="RFC8017"/>. This
padding mode has long been known to have security issues, since at least Bleichenbacher's attack in
1998. It was supported in JWE due to the wide deployment of this algorithm, especially in legacy
hardware. However, more secure replacements such as OAEP <xref target="RFC8017"/> or elliptic curve encryption
algorithms are now widely available. NIST has disallowed the use of this encryption mode for federal
use since the end of 2023 <xref target="NIST.SP800-131Ar2"/> and a CFRG draft <xref target="I-D.irtf-cfrg-rsa-guidance"/> also deprecates
this encryption mode for IETF protocols. This document therefore also deprecates this algorithm for
JWE.</t>
      </section>
      <section anchor="guidance-on-deprecation">
        <name>Guidance on deprecation</name>
        <t>Both of the algorithms listed above are deprecated for use in JWS and JWE. JOSE library developers
<bcp14>SHOULD</bcp14> deprecate support for these algorithms and commit to a timeline for removal. Application
developers <bcp14>SHOULD</bcp14> disable support for these algorithms by default. New specifications building on
top of JOSE <bcp14>MUST NOT</bcp14> allow the use of either algorithm.</t>
        <t>The IANA algorithm registry distinguishes between algorithms that are "Deprecated" and those that are
"Prohibited". The algorithms identified in this document are to be marked as Deprecated only. Existing
specifications and applictions that make use of these algorithms can continue to do so, but should
consider adopting alternatives in future updates.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>No security issues are introduced by this specification.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="jose-algorithm-deprecations">
        <name>JOSE Algorithm Deprecations</name>
        <t>The following changes are to be made to the IANA JOSE Web Signature and Encryption Algorithms registry:</t>
        <ul spacing="normal">
          <li>
            <t>For the entry with Algorithm Name "none", update the JOSE Implementation Requirements to "Deprecated".</t>
          </li>
          <li>
            <t>For the entry with Algorithm Name "RSA1_5", update the JOSE Implementation Requirements to "Deprecated".</t>
          </li>
        </ul>
      </section>
      <section anchor="updated-review-instructions-for-designated-experts">
        <name>Updated Review Instructions for Designated Experts</name>
        <t>The review instructions for the designated experts for the IANA "JSON Web Signature and Encryption Algorithms"
registry <xref target="IANA.jose"/> in Section 7.1 of <xref target="RFC7518"/> are updated to add these additional review criteria:</t>
        <ul spacing="normal">
          <li>
            <t>For JWS signature algorithms, only algorithms that are reasonably conjectured to meet the standard security goal
of existential unforgeability under a chosen message attack (EUF-CMA) should be considered for approval.</t>
          </li>
          <li>
            <t>For JWE key management algorithms (specified with the "alg" header), only algorithms that are reasonably
conjectured to meet the standard security goal of indistinguishability under an adaptive chosen ciphertext
attack (IND-CCA2) should be considered for approval.</t>
          </li>
          <li>
            <t>For JWE content encryption methods (specified with the "enc" header), only algorithms that are reasonably
conjectured to meet the standard security goal of authenticated encryption with associated data (AEAD) should
be considered for approval.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="howmanydays" target="https://github.com/zofrex/howmanydayssinceajwtalgnonevuln/blob/deploy/data/vulns.yml">
          <front>
            <title>How Many Days Has It Been Since a JWT alg:none Vulnerability?</title>
            <author fullname="James Sanderson">
              <organization/>
            </author>
            <date year="2023" month="September" day="25"/>
          </front>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-rsa-guidance">
          <front>
            <title>Implementation Guidance for the PKCS #1 RSA Cryptography Specification</title>
            <author fullname="Alicja Kario" initials="A." surname="Kario">
              <organization>Red Hat, Inc.</organization>
            </author>
            <date day="3" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies additions and amendments to RFC 8017.
   Specifically, it provides guidance to implementers of the standard to
   protect against side-channel attacks.  It also deprecates the RSAES-
   PKCS-v1_5 encryption scheme, but provides an alternative depadding
   algorithm that protects against side-channel attacks raising from
   users of vulnerable APIs.  The purpose of this specification is to
   increase security of RSA implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-rsa-guidance-01"/>
        </reference>
        <reference anchor="NIST.SP800-131Ar2">
          <front>
            <title>Transitioning the use of cryptographic algorithms and key lengths</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Allen Roginsky" initials="A." surname="Roginsky">
              <organization/>
            </author>
            <date month="March" year="2019"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-131ar2"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="CVE" target="https://cve.mitre.org">
          <front>
            <title>Common Vulnerability Enumeration Database</title>
            <author>
              <organization>MITRE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CVSS" target="https://www.first.org/cvss/">
          <front>
            <title>Common Vulnerability Scoring System</title>
            <author>
              <organization>FIRST</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
      </references>
    </references>
    <?line 179?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
