<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.11 (Ruby 3.2.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls13-pkcs1-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.21.0 -->
  <front>
    <title abbrev="Legacy PKCS#1 codepoints for TLS 1.3">Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls13-pkcs1-01"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Popov" fullname="Andrei Popov">
      <organization>Microsoft Corp.</organization>
      <address>
        <email>andreipo@microsoft.com</email>
      </address>
    </author>
    <date year="2024" month="May" day="23"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 76?>

<t>This document allocates code points for the use of RSASSA-PKCS1-v1_5 with
client certificates in TLS 1.3. This removes an obstacle for some deployments
to migrate to TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/tls13-pkcs1/draft-ietf-tls-tls13-pkcs1.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-pkcs1/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls13-pkcs1"/>.</t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.3 <xref target="RFC8446"/> removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in
CertificateVerify messages in favor of RSASSA-PSS. While RSASSA-PSS is a
long-established signature algorithm, some legacy hardware cryptographic devices
lack support for it. While uncommon in TLS servers, these devices are sometimes
used by TLS clients for client certificates.</t>
      <t>For example, Trusted Platform Modules (TPMs) are ubiquitous hardware
cryptographic devices that are often used to protect TLS client certificate
private keys. However, a large number of TPMs are unable to produce RSASSA-PSS
signatures compatible with TLS 1.3. TPM specifications prior to 2.0 did not
define RSASSA-PSS support (see Section 5.8.1 of <xref target="TPM12"/>). TPM 2.0
includes RSASSA-PSS, but only those TPM 2.0 devices compatible with FIPS 186-4
can be relied upon to use the salt length matching the digest length, as
required for compatibility with TLS 1.3 (see Appendix B.7 of <xref target="TPM2"/>).</t>
      <t>TLS connections that rely on such devices cannot migrate to TLS 1.3. Staying on
TLS 1.2 leaks the client certificate to network attackers and additionally
prevents such deployments from protecting traffic against retroactive
decryption by an attacker with a quantum computer.</t>
      <t>Moreover, TLS negotiates the protocol version before client certificates, so
clients and servers cannot smoothly transition unaffected connections to
TLS 1.3. As a result, this issue is not limited to individual connections
that use affected devices. It prevents entire deployments from migrating to
TLS 1.3. See <xref target="security-considerations"/> for further discussion.</t>
      <t>This document allocates code points to use these legacy keys with client
certificates in TLS 1.3.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="pkcs1-v15-signaturescheme-types">
      <name>PKCS#1 v1.5 SignatureScheme Types</name>
      <t>The following SignatureScheme values are defined for use with TLS 1.3.</t>
      <artwork><![CDATA[
    enum {
        rsa_pkcs1_sha256_legacy(0x0420),
        rsa_pkcs1_sha384_legacy(0x0520),
        rsa_pkcs1_sha512_legacy(0x0620),
    } SignatureScheme;
]]></artwork>
      <t>The above code points indicate a signature algorithm using RSASSA-PKCS1-v1_5
<xref target="RFC8017"/> with the corresponding hash algorithm as defined in
<xref target="SHS"/>. They are only defined for signatures in
the client CertificateVerify message and are not defined for use in other
contexts. In particular, servers intending to advertise support for
RSASSA-PKCS1-v1_5 signatures in the certificates themselves should use the
<tt>rsa_pkcs1_*</tt> constants defined in <xref target="RFC8446"/>.</t>
      <t>Clients MUST NOT advertise these values in the <tt>signature_algorithms</tt> extension
of the ClientHello. They MUST NOT accept these values in the server
CertificateVerify message.</t>
      <t>Servers that wish to support clients authenticating with legacy
RSASSA-PKCS1-v1_5-only keys MAY send these values in the
<tt>signature_algorithms</tt> extension of the CertificateRequest message and accept
them in the client CertificateVerify message. Servers MUST NOT accept these code
points if not offered in the CertificateRequest message.</t>
      <t>Clients with such legacy keys MAY negotiate the use of these signature
algorithms if offered by the server.  Clients SHOULD NOT negotiate them with
keys that support RSASSA-PSS.</t>
      <t>TLS implementations SHOULD disable these code points by default.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to this document, legacy RSA keys would prevent client certificate
deployments from adopting TLS 1.3. The new code points allow such deployments
to upgrade without replacing the keys. TLS 1.3 fixes a privacy flaw
<xref target="PRIVACY"/> with client certificates, so
upgrading is a particular benefit to these deployments. TLS 1.3 is also a
prequisite for post-quantum key exchanges <xref target="I-D.ietf-tls-hybrid-design"/>,
necessary for deployments to protect traffic against retroactive decryption by
an attacker with a quantum computer.</t>
      <t>Additionally, TLS negotiates protocol versions before client certificates.
Clients send ClientHellos without knowing whether the server will request to
authenticate with legacy keys. Conversely, servers respond with a TLS
version and CertificateRequest without knowing if the client will then
respond with a legacy key. If the client and server, respectively, offer and
negotiate TLS 1.3, the connection will fail due to the legacy key, when it
previously succeeded at TLS 1.2.</t>
      <t>To recover from this failure, one side must globally disable TLS 1.3 or the
client must implement an external fallback. Disabling TLS 1.3 impacts
connections that would otherwise be unaffected by this issue, while external
fallbacks break TLS's security analysis and may introduce vulnerabilities
<xref target="POODLE"/>. The new code points reduce the pressure on implementations to select
one of these problematic mitigations and unblocks TLS 1.3 deployment.</t>
      <t>At the same time, the new code points also reduce the pressure on
implementations to migrate to RSASSA-PSS. The above considerations do not apply
to server keys, so these new code points are forbidden for use with server
certificates. RSASSA-PSS continues to be required for TLS 1.3 servers using RSA
keys. This minimizes the impact to only those cases necessary to unblock TLS
1.3 deployment.</t>
      <t>Finally, when implemented incorrectly, RSASSA-PKCS1-v1_5 admits signature
forgeries <xref target="MFSA201473"/>. Implementations  producing or verifying signatures
with these algorithms MUST implement RSASSA-PKCS1-v1_5 as specified in section
8.2 of <xref target="RFC8017"/>. In particular, clients MUST include the mandatory NULL
parameter in the DigestInfo structure and produce a valid DER <xref target="X690"/>
encoding. Servers MUST reject signatures which do not meet these requirements.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entries in the
TLS SignatureScheme registry, defined in <xref target="RFC8446"/>. The "Recommended" column
should be set to "N", and the "Reference" column should be set to this document.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0420</td>
            <td align="left">
              <tt>rsa_pkcs1_sha256_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0520</td>
            <td align="left">
              <tt>rsa_pkcs1_sha384_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0620</td>
            <td align="left">
              <tt>rsa_pkcs1_sha512_legacy</tt></td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2002"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
        </reference>
        <reference anchor="TPM12" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">
          <front>
            <title>TPM Main Specification Level 2 Version 1.2, Revision 116, Part 2 - Structures of the TPM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2011" month="March" day="01"/>
          </front>
        </reference>
        <reference anchor="TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59, Part 1: Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November" day="08"/>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SHS">
          <front>
            <title>Secure Hash Standard</title>
            <author fullname="Quynh H. Dang" initials="Q." surname="Dang">
              <organization/>
            </author>
            <date month="July" year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MFSA201473" target="https://www.mozilla.org/en-US/security/advisories/mfsa2014-73/">
          <front>
            <title>RSA Signature Forgery in NSS</title>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <date year="2014" month="September" day="23"/>
          </front>
        </reference>
        <reference anchor="POODLE" target="https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">
          <front>
            <title>This POODLE bites: exploiting the SSL 3.0 fallback</title>
            <author initials="B." surname="Moeller" fullname="Bodo Moeller">
              <organization/>
            </author>
            <date year="2014" month="October" day="14"/>
          </front>
        </reference>
        <reference anchor="PRIVACY">
          <front>
            <title>Push away your privacy: Precise user tracking based on TLS client certificate authentication</title>
            <author fullname="Matthias Wachs" initials="M." surname="Wachs">
              <organization/>
            </author>
            <author fullname="Quirin Scheitle" initials="Q." surname="Scheitle">
              <organization/>
            </author>
            <author fullname="Georg Carle" initials="G." surname="Carle">
              <organization/>
            </author>
            <date month="June" year="2017"/>
          </front>
          <seriesInfo name="2017 Network Traffic Measurement and Analysis Conference" value="(TMA)"/>
          <seriesInfo name="DOI" value="10.23919/tma.2017.8002897"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="5" month="April" year="2024"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-10"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
