<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.26 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-x509-alg-none-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title>Unsigned X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-alg-none-01"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="20"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>self-signed certificate</keyword>
    <abstract>
      <?line 40?>

<t>This document defines a placeholder X.509 signature algorithm that may be used
in contexts where the consumer of the certificate does not intend to verify the
signature.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidben.github.io/x509-alg-none/draft-ietf-lamps-x509-alg-none.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-x509-alg-none/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidben/x509-alg-none"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>An X.509 certificate <xref target="RFC5280"/> relates two entities in the PKI: information
about a subject and a proof from an issuer. Viewing the PKI as a graph of
with entities as nodes, as in <xref target="RFC4158"/>, a certificate is an edge between the
subject and issuer.</t>
      <t>In some contexts, an application needs standalone subject information instead of
a certificate. In the graph model, the application needs a node, not an edge.
For example, certification path validation (<xref section="6" sectionFormat="of" target="RFC5280"/>) begins at
a trust anchor, or root certification authority (root CA). The application
trusts this trust anchor information out-of-band and does not require an
issuer's signature.</t>
      <t>X.509 does not define a structure for this scenario. Instead, X.509 trust
anchors are often represented with "self-signed" certificates, where the
subject's key signs over itself. Other formats, such as <xref target="RFC5914"/> exist to convey trust anchors, but
self-signed certificates remain widely used. Additionally, some TLS <xref target="RFC8446"/>
server deployments use self-signed certificates when they do not intend to
present a CA-issued identity, instead expecting the relying party to
authenticate the certificate out-of-band, e.g. via a known fingerprint.</t>
      <t>These self-signatures typically have no security value, aren't checked by
the receiver, and only serve as placeholders to meet syntactic requirements of
an X.509 certificate.</t>
      <t>Computing signatures as placeholders has some drawbacks:</t>
      <ul spacing="normal">
        <li>
          <t>Post-quantum signature algorithms are large, so including a self-signature
significantly increases the size of the payload.</t>
        </li>
        <li>
          <t>If the subject is an end entity, rather than a CA, computing an X.509
signature risks cross-protocol attacks with the intended use of the key.</t>
        </li>
        <li>
          <t>It is ambiguous whether such a self-signature requires the CA bit in basic
constraints or keyCertSign in key usage. If the key is intended for a
non-X.509 use, asserting those capabilities is an unnecessary risk.</t>
        </li>
        <li>
          <t>If end entity's key is not a signing key (e.g. a KEM key), there is no valid
signature algorithm to use with the key.</t>
        </li>
      </ul>
      <t>This document defines a profile for unsigned X.509 certificates, which may be
used when the certificate is used as a container for subject information,
without any specific issuer.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="constructing-unsigned-certificates">
      <name>Constructing Unsigned Certificates</name>
      <t>This document defines the id-unsigned object identifier (OID) under the OID arc
defined in <xref target="RFC8411"/>:</t>
      <artwork><![CDATA[
  id-unsigned OBJECT IDENTIFIER ::= {1 3 101 TBD}
]]></artwork>
      <t>To construct an unsigned X.509 certificate, the sender MUST set the
Certificate's signatureAlgorithm and TBSCertificate's signature fields each to
an AlgorithmIdentifier with algorithm id-unsigned. The parameters for
id-unsigned MUST be present and MUST be encoded as NULL. The
Certificate's signatureValue field MUST be a BIT STRING of length zero.</t>
    </section>
    <section anchor="consuming-unsigned-certificates">
      <name>Consuming Unsigned Certificates</name>
      <t>X.509 signatures of type id-unsigned are always invalid. This contrasts
with <xref target="JWT"/>. When processing X.509 certificates without verifying signatures,
receivers MAY accept id-unsigned. When verifying X.509 signatures,
receivers MUST reject id-unsigned. In particular, X.509 validators MUST
NOT accept id-unsigned in the place of a signature in the certification
path.</t>
      <t>X.509 applications must already account for unknown signature algorithms, so
applications are RECOMMENDED to satisfy these requirements by ignoring this
document. An unmodified X.509 validator will not recognize id-unsigned
and is thus already expected to reject it in the certification path. Conversely,
in contexts where an X.509 application was ignoring the self-signature,
id-unsigned will also be ignored, but more efficiently.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>If an application uses a self-signature when constructing a subject-only
certificate for a non-X.509 key, the X.509 signature payload and those of the
key's intended use may collide. The self-signature might then be used as part of
a cross-protocol attack. Using id-unsigned avoids a single key being used
for both X.509 and the end-entity protocol, eliminating this risk.</t>
      <t>If an application accepts id-unsigned as part of a certification path, or
in any other context where it is necessary to verify the X.509 signature, the
signature check would be bypassed. Thus, <xref target="consuming-unsigned-certificates"/>
prohibits this and recommends that applications not treat id-unsigned
differently from any other previously unrecognized signature algorithm.
Non-compliant applications that instead accept id-unsigned as a valid
signature risk of vulnerabilities analogous to <xref target="JWT"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add the following entry to the
"SMI Security for Cryptographic Algorithms" registry <xref target="RFC8411"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD</td>
            <td align="left">id-unsigned</td>
            <td align="left">[this-RFC]</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8411">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Andrews" initials="R." surname="Andrews"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="JWT" target="https://www.howmanydayssinceajwtalgnonevuln.com/">
          <front>
            <title>How Many Days Has It Been Since a JWT alg:none Vulnerability?</title>
            <author initials="J." surname="Sanderson" fullname="James 'zofrex' Sanderson">
              <organization/>
            </author>
            <date year="2024" month="October" day="09"/>
          </front>
        </reference>
        <reference anchor="RFC4158">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Certification Path Building</title>
            <author fullname="M. Cooper" initials="M." surname="Cooper"/>
            <author fullname="Y. Dzambasow" initials="Y." surname="Dzambasow"/>
            <author fullname="P. Hesse" initials="P." surname="Hesse"/>
            <author fullname="S. Joseph" initials="S." surname="Joseph"/>
            <author fullname="R. Nicholas" initials="R." surname="Nicholas"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document provides guidance and recommendations to developers building X.509 public-key certification paths within their applications. By following the guidance and recommendations defined in this document, an application developer is more likely to develop a robust X.509 certificate-enabled application that can build valid certification paths across a wide range of PKI environments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4158"/>
          <seriesInfo name="DOI" value="10.17487/RFC4158"/>
        </reference>
        <reference anchor="RFC5914">
          <front>
            <title>Trust Anchor Format</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="S. Ashmore" initials="S." surname="Ashmore"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document describes a structure for representing trust anchor information. A trust anchor is an authoritative entity represented by a public key and associated data. The public key is used to verify digital signatures, and the associated data is used to constrain the types of information or actions for which the trust anchor is authoritative. The structures defined in this document are intended to satisfy the format-related requirements defined in Trust Anchor Management Requirements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5914"/>
          <seriesInfo name="DOI" value="10.17487/RFC5914"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
    </references>
    <?line 156?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Bob Beck, Nick Harper, and Sophie Schmieg for reviewing an early
iteration of this document. Thanks to Alex Gaynor for providing a link to cite
for <xref target="JWT"/>. Thanks to Russ Housley for additional input.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
