<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.26 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-jose-deprecate-none-rsa15-02" category="std" consensus="true" submissionType="IETF" updates="7518" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title>JOSE: Deprecate 'none' and 'RSA1_5'</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-jose-deprecate-none-rsa15-02"/>
    <author fullname="Neil Madden">
      <organization>Teya</organization>
      <address>
        <email>neil.e.madden@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="02"/>
    <area>Security</area>
    <workgroup>Javascript Object Signing and Encryption</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 64?>

<t>This document updates <xref target="RFC7518"/> to deprecate the JWS algorithm "none" and the JWE algorithm
"RSA1_5". These algorithms have known security weaknesses. It also updates the Review
Instructions for Designated Experts to establish baseline security requirements that future
algorithm registrations should meet.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://NeilMadden.github.io/jose-deprecate-none-rsa1_5/draft-ietf-jose-deprecate-none-rsa15.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-jose-deprecate-none-rsa15/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Javascript Object Signing and Encryption Working Group mailing list (<eref target="mailto:jose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/jose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/jose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NeilMadden/jose-deprecate-none-rsa1_5"/>.</t>
    </note>
  </front>
  <middle>
    <?line 71?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>JSON Web Algorithms (JWA, <xref target="RFC7518"/>) introduced several standard algorithms for both JSON Web
Signature (JWS) and JSON Web Encryption (JWE). Many of these algorithms have stood the test of time
and are still in widespread use. However, some algorithms have proved to be difficult to implement
correctly leading to exploitable vulnerabilities. This document deprecates two such algorithms:</t>
      <ul spacing="normal">
        <li>
          <t>The JWS "none" algorithm, which indicates that no security is applied to the message at all.</t>
        </li>
        <li>
          <t>The JWE "RSA1_5" algorithm, which indicates RSA encryption with PKCS#1 version 1.5 padding.</t>
        </li>
      </ul>
      <t>Note that RSA signatures using PKCS#1 version 1.5 padding (<tt>RS256</tt>, <tt>RS384</tt>, and <tt>RS512</tt>) are
unchanged by this specification and can still be used.</t>
      <t>Additionally, this document also updates the Review Instructions for the JOSE Designated Experts,
to establish baseline security requirements for future JOSE algorithm registrations. Only algorithms
that are reasonably believed to satisfy these requirements should be registered in future.</t>
      <section anchor="the-none-algorithm">
        <name>The 'none' algorithm</name>
        <t>The "none" algorithm creates an Unsecured JWS, whose contents are completely unsecured as the name
implies. Despite strong guidance in the original RFC around not accepting Unsecured JWS by default,
many implementations have had serious bugs due to accepting this algorithm. In some cases, this has
led to a complete loss of security as authenticity and integrity checking can be disabled by an
adversary simply by changing the algorithm ("alg") header in the JWS. The website <xref target="howmanydays"/>
tracks public vulnerabilities due to implementations mistakenly accepting the "none" algorithm. It
currently lists 12 reports, many of which have high impact ratings. The following is a partial list
of issues known to have been caused by misuse of the "none" algorithm, with a Common Vulnerability
Enumeration <xref target="CVE"/> identifier, and a Common Vulnerability Scoring System <xref target="CVSS"/> score
indicating the severity of the impact:</t>
        <ul spacing="normal">
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2018-1000531">CVE-2018-1000531</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2017-10862">CVE-2017-10862</eref> - CVSS: 5.3 (Medium)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2022-23540">CVE-2022-23540</eref> - CVSS: 7.6 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2020-15957">CVE-2020-15957</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29500">CVE-2021-29500</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29451">CVE-2021-29451</eref> - CVSS: 9.1 (Critical)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29455">CVE-2021-29455</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-22160">CVE-2021-22160</eref> - CVSS: 9.8 (Critical)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-32631">CVE-2021-32631</eref> - CVSS: 6.5 (Medium)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2023-29357">CVE-2023-29357</eref> - CVSS: 9.8 (Critical)</t>
          </li>
        </ul>
        <t>Many other vulnerabilities have been reported without an accompanying CVE, which we do not list here.</t>
        <t>Although there are some legitimate use-cases for Unsecured JWS, these are relatively few in number
and can easily be satisfied by alternative means. The small risk of breaking
some of these use-cases is far outweighed by the improvement in security for the majority of
JWS users who may be impacted by accidental acceptance of the "none" algorithm.</t>
      </section>
      <section anchor="the-rsa15-algorithm">
        <name>The 'RSA1_5' algorithm</name>
        <t>The "RSA1_5" algorithm implements RSA encryption using PKCS#1 version 1.5 padding <xref target="RFC8017"/> (section 7.2). This
padding mode has long been known to have security issues, since at least Bleichenbacher's attack in
1998. It was supported in JWE due to the wide deployment of this algorithm, especially in legacy
hardware. However, more secure replacements such as OAEP <xref target="RFC8017"/> or elliptic curve encryption
algorithms are now widely available. NIST has disallowed the use of this encryption mode for federal
use since the end of 2023 <xref target="NIST.SP800-131Ar2"/> and a CFRG draft <xref target="I-D.irtf-cfrg-rsa-guidance"/> also deprecates
this encryption mode for IETF protocols. This document therefore also deprecates this algorithm for
JWE.</t>
      </section>
      <section anchor="guidance-on-deprecation">
        <name>Guidance on deprecation</name>
        <t>Both of the algorithms listed above are deprecated for use in JOSE—the <tt>none</tt> algorithm for JWS,
and <tt>RSA1_5</tt> for JWE. JOSE library developers should deprecate support for these algorithms. Application
developers <bcp14>MUST</bcp14> disable support for these algorithms by default. New specifications building on
top of JOSE <bcp14>MUST NOT</bcp14> allow the use of either algorithm.</t>
        <t>The IANA algorithm registry distinguishes between algorithms that are "Deprecated" and those that are
"Prohibited". The algorithms identified in this document are to be marked as Deprecated only. Existing
specifications and applictions that make use of these algorithms can continue to do so, but should
consider adopting alternatives in future updates.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is concerned with security, since the security of JOSE implementations directly affects the security of systems that include them (see for example the long list of CVEs in Sec. 1.1).</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="jose-algorithm-deprecations">
        <name>JOSE Algorithm Deprecations</name>
        <t>The following changes are to be made to the IANA JOSE Web Signature and Encryption Algorithms registry:</t>
        <ul spacing="normal">
          <li>
            <t>For the entry with Algorithm Name "none", update the JOSE Implementation Requirements to "Deprecated".</t>
          </li>
          <li>
            <t>For the entry with Algorithm Name "RSA1_5", update the JOSE Implementation Requirements to "Deprecated".</t>
          </li>
        </ul>
      </section>
      <section anchor="updated-review-instructions-for-designated-experts">
        <name>Updated Review Instructions for Designated Experts</name>
        <t>The review instructions for the designated experts for the IANA "JSON Web Signature and Encryption Algorithms"
registry <xref target="IANA.jose"/> in Section 7.1 of <xref target="RFC7518"/> are updated to add these additional review criteria:</t>
        <ul spacing="normal">
          <li>
            <t>For JWS signature algorithms, only algorithms that are reasonably conjectured to meet the standard security goal
of existential unforgeability under a chosen message attack (EUF-CMA) should be considered for approval. See textbooks such as <xref target="BonehShoup"/> (section 13.1.1) for a definition of existential unforgeability.</t>
          </li>
          <li>
            <t>For JWE key management algorithms (specified with the "alg" header), only algorithms that are reasonably
conjectured to meet the standard security goal of indistinguishability under an adaptive chosen ciphertext
attack (IND-CCA2) should be considered for approval, as defined in textbooks such as <xref target="BonehShoup"/> (section 9.2.2 and chapter 12).</t>
          </li>
          <li>
            <t>For JWE content encryption methods (specified with the "enc" header), only algorithms that are reasonably
conjectured to meet the standard security goal of authenticated encryption with associated data (AEAD) should
be considered for approval. See <xref target="RFC5116"/> and textbooks, such as <xref target="BonehShoup"/> (section 9.1), for the definition of AEAD security.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC5116">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="howmanydays" target="https://github.com/zofrex/howmanydayssinceajwtalgnonevuln/blob/deploy/data/vulns.yml">
          <front>
            <title>How Many Days Has It Been Since a JWT alg:none Vulnerability?</title>
            <author fullname="James Sanderson">
              <organization/>
            </author>
            <date year="2023" month="September" day="25"/>
          </front>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-rsa-guidance">
          <front>
            <title>Implementation Guidance for the PKCS #1 RSA Cryptography Specification</title>
            <author fullname="Alicja Kario" initials="A." surname="Kario">
              <organization>Red Hat, Inc.</organization>
            </author>
            <date day="20" month="February" year="2025"/>
            <abstract>
              <t>   This document specifies additions and amendments to RFC 8017.
   Specifically, it provides guidance to implementers of the standard to
   protect against side-channel attacks.  It also deprecates the RSAES-
   PKCS-v1_5 encryption scheme, but provides an alternative depadding
   algorithm that protects against side-channel attacks raising from
   users of vulnerable APIs.  The purpose of this specification is to
   increase security of RSA implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-rsa-guidance-03"/>
        </reference>
        <reference anchor="NIST.SP800-131Ar2">
          <front>
            <title>Transitioning the use of cryptographic algorithms and key lengths</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Allen Roginsky" initials="A." surname="Roginsky">
              <organization/>
            </author>
            <date month="March" year="2019"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-131ar2"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="CVE" target="https://cve.mitre.org">
          <front>
            <title>Common Vulnerability Enumeration Database</title>
            <author>
              <organization>MITRE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CVSS" target="https://www.first.org/cvss/">
          <front>
            <title>Common Vulnerability Scoring System</title>
            <author>
              <organization>FIRST</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="BonehShoup" target="https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_6.pdf">
          <front>
            <title>A Graduate Course in Applied Cryptography (v0.6)</title>
            <author fullname="Dan Boneh">
              <organization/>
            </author>
            <author fullname="Victor Shoup">
              <organization/>
            </author>
            <date year="2023" month="January" day="14"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 193?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author would like to thank the following people for feedback and useful suggestions: Mike Ounsworth, Michael Jones, Yaron Sheffer, and John Mattsson.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
