<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-x509-alg-none-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title>Unsigned X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-alg-none-02"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="10"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>self-signed certificate</keyword>
    <abstract>
      <?line 40?>

<t>This document defines a placeholder X.509 signature algorithm that may be used
in contexts where the consumer of the certificate is not expected to verify the
signature.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidben.github.io/x509-alg-none/draft-ietf-lamps-x509-alg-none.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-x509-alg-none/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidben/x509-alg-none"/>.</t>
    </note>
  </front>
  <middle>
    <?line 46?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>An X.509 certificate <xref target="RFC5280"/> relates two entities in the PKI: information
about a subject and a proof from an issuer. Viewing the PKI as a graph of
with entities as nodes, as in <xref target="RFC4158"/>, a certificate is an edge between the
subject and issuer.</t>
      <t>In some contexts, an application needs standalone subject information instead of
a certificate. In the graph model, the application needs a node, not an edge.
For example, certification path validation (<xref section="6" sectionFormat="of" target="RFC5280"/>) begins at
a trust anchor, or root certification authority (root CA). The application
trusts this trust anchor information out-of-band and does not require an
issuer's signature.</t>
      <t>X.509 does not define a structure for this scenario. Instead, X.509 trust
anchors are often represented with "self-signed" certificates, where the
subject's key signs over itself. Other formats, such as <xref target="RFC5914"/> exist to convey trust anchors, but
self-signed certificates remain widely used. Additionally, some TLS <xref target="RFC8446"/>
server deployments use self-signed certificates when they do not intend to
present a CA-issued identity, instead expecting the relying party to
authenticate the certificate out-of-band, e.g. via a known fingerprint.</t>
      <t>These self-signatures typically have no security value, aren't checked by
the receiver, and only serve as placeholders to meet syntactic requirements of
an X.509 certificate.</t>
      <t>Computing signatures as placeholders has some drawbacks:</t>
      <ul spacing="normal">
        <li>
          <t>Post-quantum signature algorithms are large, so including a self-signature
significantly increases the size of the payload.</t>
        </li>
        <li>
          <t>If the subject is an end entity, rather than a CA, computing an X.509
signature risks cross-protocol attacks with the intended use of the key.</t>
        </li>
        <li>
          <t>It is ambiguous whether such a self-signature requires the CA bit in basic
constraints or keyCertSign in key usage. If the key is intended for a
non-X.509 use, asserting those capabilities is an unnecessary risk.</t>
        </li>
        <li>
          <t>If end entity's key is not a signing key (e.g. a KEM key), there is no valid
signature algorithm to use with the key.</t>
        </li>
      </ul>
      <t>This document defines a profile for unsigned X.509 certificates, which may be
used when the certificate is used as a container for subject information,
without any specific issuer.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="constructing-unsigned-certificates">
      <name>Constructing Unsigned Certificates</name>
      <t>This document defines the id-alg-unsigned object identifier (OID) under the OID arc
defined in <xref target="RFC8411"/>:</t>
      <artwork><![CDATA[
  id-alg-unsigned OBJECT IDENTIFIER ::= {1 3 6 1 5 5 7 6 36}
]]></artwork>
      <t>To construct an unsigned X.509 certificate, the sender MUST set the
Certificate's signatureAlgorithm and TBSCertificate's signature fields each to
an AlgorithmIdentifier with algorithm id-alg-unsigned. The parameters for
id-alg-unsigned MUST be present and MUST be encoded as NULL. The
Certificate's signatureValue field MUST be a BIT STRING of length zero.</t>
      <t>An unsigned certificate has no issuer, so there are no meaningful values to use for
the issuer and issuerUniqueID fields and the authority key identifier and issuer
alternative name extensions. This document does not mandate particular values
but gives general guidance: Senders SHOULD omit issuerUniqueID, authority key
identifier, and issuer alternative name, unless needed for compatibility with
existing applications. <xref target="RFC5280"/> does not permit empty issuers. Senders MAY
use the subject field (if the subject is not empty), as in a self-signed
certificate, or instead use a short placeholder value.</t>
    </section>
    <section anchor="consuming-unsigned-certificates">
      <name>Consuming Unsigned Certificates</name>
      <t>X.509 signatures of type id-alg-unsigned are always invalid. This contrasts
with <xref target="JWT"/>. When processing X.509 certificates without verifying signatures,
receivers MAY accept id-alg-unsigned. When verifying X.509 signatures,
receivers MUST reject id-alg-unsigned. In particular, X.509 validators MUST
NOT accept id-alg-unsigned in the place of a signature in the certification
path.</t>
      <t>X.509 applications must already account for unknown signature algorithms, so
applications are RECOMMENDED to satisfy these requirements by ignoring this
document. An unmodified X.509 validator will not recognize id-alg-unsigned
and is thus already expected to reject it in the certification path. Conversely,
in contexts where an X.509 application was ignoring the self-signature,
id-alg-unsigned will also be ignored, but more efficiently.</t>
      <t>In other contexts, applications may require modifications. For example, an
application that uses self-signedness in interpreting its local configuration
may need to modify its configuration model or user interface before using an
unsigned certificate as a trust anchor.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>If an application uses a self-signature when constructing a subject-only
certificate for a non-X.509 key, the X.509 signature payload and those of the
key's intended use may collide. The self-signature might then be used as part of
a cross-protocol attack. Using id-alg-unsigned avoids a single key being used
for both X.509 and the end-entity protocol, eliminating this risk.</t>
      <t>If an application accepts id-alg-unsigned as part of a certification path, or
in any other context where it is necessary to verify the X.509 signature, the
signature check would be bypassed. Thus, <xref target="consuming-unsigned-certificates"/>
prohibits this and recommends that applications not treat id-alg-unsigned
differently from any other previously unrecognized signature algorithm.
Non-compliant applications that instead accept id-alg-unsigned as a valid
signature risk of vulnerabilities analogous to <xref target="JWT"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to add the following entry to the
"SMI Security for PKIX Algorithms" registry <xref target="RFC7299"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">36</td>
            <td align="left">id-alg-unsigned</td>
            <td align="left">[this-RFC]</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8411">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Andrews" initials="R." surname="Andrews"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="JWT" target="https://www.howmanydayssinceajwtalgnonevuln.com/">
          <front>
            <title>How Many Days Has It Been Since a JWT alg:none Vulnerability?</title>
            <author initials="J." surname="Sanderson" fullname="James 'zofrex' Sanderson">
              <organization/>
            </author>
            <date year="2024" month="October" day="09"/>
          </front>
        </reference>
        <reference anchor="RFC4158">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Certification Path Building</title>
            <author fullname="M. Cooper" initials="M." surname="Cooper"/>
            <author fullname="Y. Dzambasow" initials="Y." surname="Dzambasow"/>
            <author fullname="P. Hesse" initials="P." surname="Hesse"/>
            <author fullname="S. Joseph" initials="S." surname="Joseph"/>
            <author fullname="R. Nicholas" initials="R." surname="Nicholas"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document provides guidance and recommendations to developers building X.509 public-key certification paths within their applications. By following the guidance and recommendations defined in this document, an application developer is more likely to develop a robust X.509 certificate-enabled application that can build valid certification paths across a wide range of PKI environments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4158"/>
          <seriesInfo name="DOI" value="10.17487/RFC4158"/>
        </reference>
        <reference anchor="RFC5914">
          <front>
            <title>Trust Anchor Format</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="S. Ashmore" initials="S." surname="Ashmore"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document describes a structure for representing trust anchor information. A trust anchor is an authoritative entity represented by a public key and associated data. The public key is used to verify digital signatures, and the associated data is used to constrain the types of information or actions for which the trust anchor is authoritative. The structures defined in this document are intended to satisfy the format-related requirements defined in Trust Anchor Management Requirements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5914"/>
          <seriesInfo name="DOI" value="10.17487/RFC5914"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
    </references>
    <?line 170?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Bob Beck, Nick Harper, and Sophie Schmieg for reviewing an early
iteration of this document. Thanks to Alex Gaynor for providing a link to cite
for <xref target="JWT"/>. Thanks to Russ Housley for additional input.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
