<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls13-pkcs1-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="Legacy PKCS#1 codepoints for TLS 1.3">Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls13-pkcs1-00"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Popov" fullname="Andrei Popov">
      <organization>Microsoft Corp.</organization>
      <address>
        <email>andreipo@microsoft.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="30"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 76?>

<t>This document allocates code points for the use of RSASSA-PKCS1-v1_5 with
client certificates in TLS 1.3. This removes an obstacle for some deployments
to migrate to TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidben.github.io/tls13-pkcs1/draft-ietf-tls-tls13-pkcs1.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-pkcs1/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidben/tls13-pkcs1"/>.</t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.3 <xref target="RFC8446"/> removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in
CertificateVerify messages in favor of RSASSA-PSS. While RSASSA-PSS is a
long-established signature algorithm, some legacy hardware cryptographic devices
lack support for it. While uncommon in TLS servers, these devices are sometimes
used by TLS clients for client certificates.</t>
      <t>For example, Trusted Platform Modules (TPMs) are ubiquitous hardware
cryptographic devices that are often used to protect TLS client certificate
private keys. However, a large number of TPMs are unable to produce RSASSA-PSS
signatures compatible with TLS 1.3. TPM specifications prior to 2.0 did not
define RSASSA-PSS support (see Section 5.8.1 of <xref target="TPM12"/>). TPM 2.0
includes RSASSA-PSS, but only those TPM 2.0 devices compatible with FIPS 186-4
can be relied upon to use the salt length matching the digest length, as
required for compatibility with TLS 1.3 (see Appendix B.7 of <xref target="TPM2"/>).</t>
      <t>TLS connections that rely on such devices cannot migrate to TLS 1.3. Staying on
TLS 1.2 leaks the client certificate to network attackers and additionally
prevents such deployments from protecting traffic against retroactive
decryption by an attacker with a quantum computer.</t>
      <t>Moreover, TLS negotiates the protocol version before client certificates, so
clients and servers cannot smoothly transition unaffected connections to
TLS 1.3. As a result, this issue is not limited to individual connections
that use affected devices. It prevents entire deployments from migrating to
TLS 1.3. See <xref target="security-considerations"/> for further discussion.</t>
      <t>This document allocates code points to use these legacy keys with client
certificates in TLS 1.3.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="pkcs1-v15-signaturescheme-types">
      <name>PKCS#1 v1.5 SignatureScheme Types</name>
      <t>The following SignatureScheme values are defined for use with TLS 1.3.</t>
      <artwork><![CDATA[
    enum {
        rsa_pkcs1_sha256_legacy(0x0420),
        rsa_pkcs1_sha384_legacy(0x0520),
        rsa_pkcs1_sha512_legacy(0x0620),
    } SignatureScheme;
]]></artwork>
      <t>The above code points indicate a signature algorithm using RSASSA-PKCS1-v1_5
<xref target="RFC8017"/> with the corresponding hash algorithm as defined in
<xref target="SHS"/>. They are only defined for signatures in
the client CertificateVerify message and are not defined for use in other
contexts. In particular, servers intending to advertise support for
RSASSA-PKCS1-v1_5 signatures in the certificates themselves should use the
<tt>rsa_pkcs1_*</tt> constants defined in <xref target="RFC8446"/>.</t>
      <t>Clients MUST NOT advertise these values in the <tt>signature_algorithms</tt> extension
of the ClientHello. They MUST NOT accept these values in the server
CertificateVerify message.</t>
      <t>Servers that wish to support clients authenticating with legacy
RSASSA-PKCS1-v1_5-only keys MAY send these values in the
<tt>signature_algorithms</tt> extension of the CertificateRequest message and accept
them in the client CertificateVerify message. Servers MUST NOT accept these code
points if not offered in the CertificateRequest message.</t>
      <t>Clients with such legacy keys MAY negotiate the use of these signature
algorithms if offered by the server.  Clients SHOULD NOT negotiate them with
keys that support RSASSA-PSS.</t>
      <t>TLS implementations SHOULD disable these code points by default.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to this document, legacy RSA keys would prevent client certificate
deployments from adopting TLS 1.3. The new code points allow such deployments
to upgrade without replacing the keys. TLS 1.3 fixes a privacy flaw
<xref target="PRIVACY"/> with client certificates, so
upgrading is a particular benefit to these deployments. TLS 1.3 is also a
prequisite for post-quantum key exchanges <xref target="I-D.ietf-tls-hybrid-design"/>,
necessary for deployments to protect traffic against retroactive decryption by
an attacker with a quantum computer.</t>
      <t>Additionally, TLS negotiates protocol versions before client certificates.
Clients send ClientHellos without knowing whether the server will request to
authenticate with legacy keys. Conversely, servers respond with a TLS
version and CertificateRequest without knowing if the client will then
respond with a legacy key. If the client and server, respectively, offer and
negotiate TLS 1.3, the connection will fail due to the legacy key, when it
previously succeeded at TLS 1.2.</t>
      <t>To recover from this failure, one side must globally disable TLS 1.3 or the
client must implement an external fallback. Disabling TLS 1.3 impacts
connections that would otherwise be unaffected by this issue, while external
fallbacks break TLS's security analysis and may introduce vulnerabilities
<xref target="POODLE"/>. The new code points reduce the pressure on implementations to select
one of these problematic mitigations and unblocks TLS 1.3 deployment.</t>
      <t>At the same time, the new code points also reduce the pressure on
implementations to migrate to RSASSA-PSS. The above considerations do not apply
to server keys, so these new code points are forbidden for use with server
certificates. RSASSA-PSS continues to be required for TLS 1.3 servers using RSA
keys. This minimizes the impact to only those cases necessary to unblock TLS
1.3 deployment.</t>
      <t>Finally, when implemented incorrectly, RSASSA-PKCS1-v1_5 admits signature
forgeries <xref target="MFSA201473"/>. Implementations  producing or verifying signatures
with these algorithms MUST implement RSASSA-PKCS1-v1_5 as specified in section
8.2 of <xref target="RFC8017"/>. In particular, clients MUST include the mandatory NULL
parameter in the DigestInfo structure and produce a valid DER <xref target="X690"/>
encoding. Servers MUST reject signatures which do not meet these requirements.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entries in the
TLS SignatureScheme registry, defined in <xref target="RFC8446"/>. The "Recommended" column
should be set to "N", and the "Reference" column should be set to this document.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0420</td>
            <td align="left">
              <tt>rsa_pkcs1_sha256_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0520</td>
            <td align="left">
              <tt>rsa_pkcs1_sha384_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0620</td>
            <td align="left">
              <tt>rsa_pkcs1_sha512_legacy</tt></td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2002"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
        </reference>
        <reference anchor="TPM12" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">
          <front>
            <title>TPM Main Specification Level 2 Version 1.2, Revision 116, Part 2 - Structures of the TPM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2011" month="March" day="01"/>
          </front>
        </reference>
        <reference anchor="TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59, Part 1: Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November" day="08"/>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SHS">
          <front>
            <title>Secure Hash Standard</title>
            <author fullname="Quynh H. Dang" initials="Q." surname="Dang">
              <organization/>
            </author>
            <date month="July" year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MFSA201473" target="https://www.mozilla.org/en-US/security/advisories/mfsa2014-73/">
          <front>
            <title>RSA Signature Forgery in NSS</title>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <date year="2014" month="September" day="23"/>
          </front>
        </reference>
        <reference anchor="POODLE" target="https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">
          <front>
            <title>This POODLE bites: exploiting the SSL 3.0 fallback</title>
            <author initials="B." surname="Moeller" fullname="Bodo Moeller">
              <organization/>
            </author>
            <date year="2014" month="October" day="14"/>
          </front>
        </reference>
        <reference anchor="PRIVACY">
          <front>
            <title>Push away your privacy: Precise user tracking based on TLS client certificate authentication</title>
            <author fullname="Matthias Wachs" initials="M." surname="Wachs">
              <organization/>
            </author>
            <author fullname="Quirin Scheitle" initials="Q." surname="Scheitle">
              <organization/>
            </author>
            <author fullname="Georg Carle" initials="G." surname="Carle">
              <organization/>
            </author>
            <date month="June" year="2017"/>
          </front>
          <seriesInfo name="2017 Network Traffic Measurement and Analysis Conference" value="(TMA)"/>
          <seriesInfo name="DOI" value="10.23919/tma.2017.8002897"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="September" year="2023"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
