<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-lamps-x509-alg-none-04" category="std" consensus="true" submissionType="IETF" updates="5280" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title>Unsigned X.509 Certificates</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-alg-none-04"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="27"/>
    <area>Security</area>
    <workgroup>Limited Additional Mechanisms for PKIX and SMIME</workgroup>
    <keyword>self-signed certificate</keyword>
    <abstract>
      <?line 51?>

<t>This document defines a placeholder X.509 signature algorithm that may be used
in contexts where the consumer of the certificate is not expected to verify the
signature.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidben.github.io/x509-alg-none/draft-ietf-lamps-x509-alg-none.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-lamps-x509-alg-none/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Limited Additional Mechanisms for PKIX and SMIME Working Group mailing list (<eref target="mailto:spasm@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spasm/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spasm/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidben/x509-alg-none"/>.</t>
    </note>
  </front>
  <middle>
    <?line 57?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>An X.509 certificate <xref target="RFC5280"/> relates two entities in the PKI: information
about a subject and a proof from an issuer. Viewing the PKI as a graph with
entities as nodes, as in <xref target="RFC4158"/>, a certificate is an edge between the
subject and issuer.</t>
      <t>In some contexts, an application needs standalone subject information instead of
a certificate. In the graph model, the application needs a node, not an edge.
For example, certification path validation (<xref section="6" sectionFormat="of" target="RFC5280"/>) begins at
a trust anchor, or root certification authority (root CA). The application
trusts this trust anchor information out-of-band and does not require an
issuer's signature.</t>
      <t>X.509 does not define a structure for this scenario. Instead, X.509 trust
anchors are often represented with "self-signed" certificates, where the
subject's key signs over itself. Other formats, such as <xref target="RFC5914"/> exist to
convey trust anchors, but self-signed certificates remain widely used.</t>
      <t>Additionally, some TLS <xref target="RFC8446"/> server deployments use self-signed
end entity certificates when they do not intend to present a CA-issued
identity, instead expecting the relying party to authenticate the certificate
out-of-band, e.g. via a known fingerprint.</t>
      <t>These self-signatures typically have no security value, aren't checked by
the receiver, and only serve as placeholders to meet syntactic requirements of
an X.509 certificate.</t>
      <t>Computing signatures as placeholders has some drawbacks:</t>
      <ul spacing="normal">
        <li>
          <t>Post-quantum signature algorithms are large, so including a self-signature
significantly increases the size of the payload.</t>
        </li>
        <li>
          <t>If the subject is an end entity, rather than a CA, computing an X.509
signature risks cross-protocol attacks with the intended use of the key.</t>
        </li>
        <li>
          <t>It is ambiguous whether such a self-signature requires the CA bit in basic
constraints or keyCertSign in key usage. If the key is intended for a
non-X.509 use, asserting those capabilities is an unnecessary risk.</t>
        </li>
        <li>
          <t>If the subject is an end entity, and the end entity's key is not a signing
key (e.g. a KEM key), there is no valid signature algorithm to use with the key.</t>
        </li>
      </ul>
      <t>This document defines a profile for unsigned X.509 certificates, which may be
used when the certificate is used as a container for subject information,
without any specific issuer.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="constructing-unsigned-certificates">
      <name>Constructing Unsigned Certificates</name>
      <t>This document defines the id-alg-unsigned object identifier (OID) under the OID arc
defined in <xref target="RFC8411"/>:</t>
      <artwork><![CDATA[
  id-alg-unsigned OBJECT IDENTIFIER ::= {1 3 6 1 5 5 7 6 36}
]]></artwork>
      <t>To construct an unsigned X.509 certificate, the sender MUST set the
Certificate's signatureAlgorithm and TBSCertificate's signature fields each to
an AlgorithmIdentifier with algorithm id-alg-unsigned. The parameters for
id-alg-unsigned MUST be omitted. The Certificate's signatureValue field MUST be
a BIT STRING of length zero.</t>
      <t>An unsigned certificate takes the place of a self-signed certificate in
scenarios where the application only requires subject information. It has no
issuer, so some requirements in the profile defined in <xref target="RFC5280"/> cannot
meaningfully be applied. However, the application may have pre-existing
requirements derived from <xref target="X.509"/> and <xref target="RFC5280"/>, so senders MAY construct
the certificate as if it were a self-signed certificate, if needed for
interoperability.</t>
      <t>In particular, the following fields describe a certificate's issuer:</t>
      <ul spacing="normal">
        <li>
          <t>issuer (<xref section="4.1.2.4" sectionFormat="of" target="RFC5280"/>)</t>
        </li>
        <li>
          <t>issuerUniqueID (<xref section="4.1.2.8" sectionFormat="of" target="RFC5280"/>)</t>
        </li>
        <li>
          <t>authority key identifier (<xref section="4.2.1.1" sectionFormat="of" target="RFC5280"/>)</t>
        </li>
        <li>
          <t>issuer alternative name (<xref section="4.2.1.7" sectionFormat="of" target="RFC5280"/>)</t>
        </li>
      </ul>
      <t>The issuer field is not optional, and both <xref target="X.509"/> and
<xref section="4.1.2.4" sectionFormat="of" target="RFC5280"/> forbid empty issuers, so such a value may not be
interoperable with existing applications.</t>
      <t>Senders MAY use a short placeholder issuer consisting of a single
relative distinguished name, with a single attribute of type id-alg-unsigned and
value a zero-length UTF8String. This placeholder name, in the string
representation of <xref target="RFC2253"/>, is:</t>
      <artwork><![CDATA[
1.3.6.1.5.5.7.6.36=
]]></artwork>
      <t>Alternatively, if the subject is not empty, senders MAY use the subject field,
as in a self-signed certificate. This may be useful in applications that, for
example, expect trust anchors to have matching issuer and subject.</t>
      <t>Senders MUST omit the issuerUniqueID field, as it is optional, not applicable,
and already forbidden by <xref section="4.1.2.8" sectionFormat="of" target="RFC5280"/>.</t>
      <t>Senders SHOULD omit the authority key identifier and issuer alternative name
extensions. <xref section="4.2.1.1" sectionFormat="of" target="RFC5280"/> requires CA certificates to include
authority key identifier, but includes an exception for self-signed certificates
used when distributing a public key. This document updates <xref target="RFC5280"/> to also
permit omitting authority key identifier in unsigned certificates.</t>
      <t>Some extensions reflect whether the subject is a CA or an end entity:</t>
      <ul spacing="normal">
        <li>
          <t>key usage (<xref section="4.2.1.3" sectionFormat="of" target="RFC5280"/>)</t>
        </li>
        <li>
          <t>basic constraints (<xref section="4.2.1.9" sectionFormat="of" target="RFC5280"/>)</t>
        </li>
      </ul>
      <t>Senders SHOULD fill in these values to reflect the subject. In particular, an
unsigned end entity certificate does not issue itself, so it SHOULD NOT assert
the keyCertSign key usage bit, and it SHOULD either omit the basic constraints
extension or set the cA boolean to FALSE.</t>
    </section>
    <section anchor="consuming-unsigned-certificates">
      <name>Consuming Unsigned Certificates</name>
      <t>X.509 signatures of type id-alg-unsigned are always invalid. This contrasts
with <xref target="JWT"/>. When processing X.509 certificates without verifying signatures,
receivers MAY accept id-alg-unsigned. When verifying X.509 signatures,
receivers MUST reject id-alg-unsigned. In particular, X.509 validators MUST
NOT accept id-alg-unsigned in the place of a signature in the certification
path.</t>
      <t>X.509 applications must already account for unknown signature algorithms, so
applications are RECOMMENDED to satisfy these requirements by ignoring this
document. An unmodified X.509 validator will not recognize id-alg-unsigned
and is thus already expected to reject it in the certification path. Conversely,
in contexts where an X.509 application was ignoring the self-signature,
id-alg-unsigned will also be ignored, but more efficiently.</t>
      <t>In other contexts, applications may require modifications. For example, an
application that uses self-signedness in interpreting its local configuration
may need to modify its configuration model or user interface before using an
unsigned certificate as a trust anchor.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>If an application uses a self-signature when constructing a subject-only
certificate for a non-X.509 key, the X.509 signature payload and those of the
key's intended use may collide. The self-signature might then be used as part of
a cross-protocol attack. Using id-alg-unsigned avoids a single key being used
for both X.509 and the end-entity protocol, eliminating this risk.</t>
      <t>If an application accepts id-alg-unsigned as part of a certification path, or
in any other context where it is necessary to verify the X.509 signature, the
signature check would be bypassed. Thus, <xref target="consuming-unsigned-certificates"/>
prohibits this and recommends that applications not treat id-alg-unsigned
differently from any other previously unrecognized signature algorithm.
Non-compliant applications that instead accept id-alg-unsigned as a valid
signature risk of vulnerabilities analogous to <xref target="JWT"/>.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entry in the SMI Security for PKIX Module Identifier registry, defined by <xref target="RFC7299"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TBD</td>
            <td align="left">id-mod-algUnsigned-2025</td>
            <td align="left">[this-RFC]</td>
          </tr>
        </tbody>
      </table>
      <t>IANA is requested to add the following entry to the
"SMI Security for PKIX Algorithms" registry <xref target="RFC7299"/>:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Decimal</th>
            <th align="left">Description</th>
            <th align="left">References</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">36</td>
            <td align="left">id-alg-unsigned</td>
            <td align="left">[this-RFC]</td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC5280">
          <front>
            <title>Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile</title>
            <author fullname="D. Cooper" initials="D." surname="Cooper"/>
            <author fullname="S. Santesson" initials="S." surname="Santesson"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <author fullname="S. Boeyen" initials="S." surname="Boeyen"/>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="W. Polk" initials="W." surname="Polk"/>
            <date month="May" year="2008"/>
            <abstract>
              <t>This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is described in detail along with standard and Internet-specific extensions. An algorithm for X.509 certification path validation is described. An ASN.1 module and examples are provided in the appendices. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5280"/>
          <seriesInfo name="DOI" value="10.17487/RFC5280"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8411">
          <front>
            <title>IANA Registration for the Cryptographic Algorithm Object Identifier Range</title>
            <author fullname="J. Schaad" initials="J." surname="Schaad"/>
            <author fullname="R. Andrews" initials="R." surname="Andrews"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>When the Curdle Security Working Group was chartered, a range of object identifiers was donated by DigiCert, Inc. for the purpose of registering the Edwards Elliptic Curve key agreement and signature algorithms. This donated set of OIDs allowed for shorter values than would be possible using the existing S/MIME or PKIX arcs. This document describes the donated range and the identifiers that were assigned from that range, transfers control of that range to IANA, and establishes IANA allocation policies for any future assignments within that range.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8411"/>
          <seriesInfo name="DOI" value="10.17487/RFC8411"/>
        </reference>
        <reference anchor="RFC7299">
          <front>
            <title>Object Identifier Registry for the PKIX Working Group</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <date month="July" year="2014"/>
            <abstract>
              <t>When the Public-Key Infrastructure using X.509 (PKIX) Working Group was chartered, an object identifier arc was allocated by IANA for use by that working group. This document describes the object identifiers that were assigned in that arc, returns control of that arc to IANA, and establishes IANA allocation policies for any future assignments within that arc.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7299"/>
          <seriesInfo name="DOI" value="10.17487/RFC7299"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="JWT" target="https://www.howmanydayssinceajwtalgnonevuln.com/">
          <front>
            <title>How Many Days Has It Been Since a JWT alg:none Vulnerability?</title>
            <author initials="J." surname="Sanderson" fullname="James 'zofrex' Sanderson">
              <organization/>
            </author>
            <date year="2024" month="October" day="09"/>
          </front>
        </reference>
        <reference anchor="X.509">
          <front>
            <title>Information technology - Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2019" month="October"/>
          </front>
          <seriesInfo name="ISO/IEC 9594-8:2020" value=""/>
        </reference>
        <reference anchor="RFC4158">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Certification Path Building</title>
            <author fullname="M. Cooper" initials="M." surname="Cooper"/>
            <author fullname="Y. Dzambasow" initials="Y." surname="Dzambasow"/>
            <author fullname="P. Hesse" initials="P." surname="Hesse"/>
            <author fullname="S. Joseph" initials="S." surname="Joseph"/>
            <author fullname="R. Nicholas" initials="R." surname="Nicholas"/>
            <date month="September" year="2005"/>
            <abstract>
              <t>This document provides guidance and recommendations to developers building X.509 public-key certification paths within their applications. By following the guidance and recommendations defined in this document, an application developer is more likely to develop a robust X.509 certificate-enabled application that can build valid certification paths across a wide range of PKI environments. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4158"/>
          <seriesInfo name="DOI" value="10.17487/RFC4158"/>
        </reference>
        <reference anchor="RFC5914">
          <front>
            <title>Trust Anchor Format</title>
            <author fullname="R. Housley" initials="R." surname="Housley"/>
            <author fullname="S. Ashmore" initials="S." surname="Ashmore"/>
            <author fullname="C. Wallace" initials="C." surname="Wallace"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document describes a structure for representing trust anchor information. A trust anchor is an authoritative entity represented by a public key and associated data. The public key is used to verify digital signatures, and the associated data is used to constrain the types of information or actions for which the trust anchor is authoritative. The structures defined in this document are intended to satisfy the format-related requirements defined in Trust Anchor Management Requirements. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5914"/>
          <seriesInfo name="DOI" value="10.17487/RFC5914"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2253">
          <front>
            <title>Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names</title>
            <author fullname="M. Wahl" initials="M." surname="Wahl"/>
            <author fullname="S. Kille" initials="S." surname="Kille"/>
            <author fullname="T. Howes" initials="T." surname="Howes"/>
            <date month="December" year="1997"/>
            <abstract>
              <t>This specification defines the string format for representing names, which is designed to give a clean representation of commonly used distinguished names, while being able to represent any distinguished name. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="2253"/>
          <seriesInfo name="DOI" value="10.17487/RFC2253"/>
        </reference>
      </references>
    </references>
    <?line 231?>

<section anchor="asn1-module">
      <name>ASN.1 Module</name>
      <artwork><![CDATA[
SignatureAlgorithmNone
  { iso(1) identified-organization(3) dod(6) internet(1)
    security(5) mechanisms(5) pkix(7) id-mod(0)
    id-mod-algUnsigned-2025(TBD) }

DEFINITIONS IMPLICIT TAGS ::=
BEGIN

IMPORTS
  SIGNATURE-ALGORITHM
  FROM AlgorithmInformation-2009  -- in [RFC5912]
    { iso(1) identified-organization(3) dod(6) internet(1)
      security(5) mechanisms(5) pkix(7) id-mod(0)
      id-mod-algorithmInformation-02(58) } ;

-- Unsigned Signature Algorithm

id-alg-unsigned OBJECT IDENTIFIER ::= { iso(1)
   identified-organization(3) dod(6) internet(1) security(5)
   mechanisms(5) pkix(7) alg(6) 36 }

sa-unsigned SIGNATURE-ALGORITHM ::= {
   IDENTIFIER id-alg-unsigned
   PARAMS ARE absent
}

END
]]></artwork>
    </section>
    <section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Bob Beck, Nick Harper, and Sophie Schmieg for reviewing an early
iteration of this document. Thanks to Alex Gaynor for providing a link to cite
for <xref target="JWT"/>. Thanks to Russ Housley for additional input.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
