<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls13-pkcs1-02" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="Legacy PKCS#1 codepoints for TLS 1.3">Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls13-pkcs1-02"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Popov" fullname="Andrei Popov">
      <organization>Microsoft Corp.</organization>
      <address>
        <email>andreipo@microsoft.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="18"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 76?>

<t>This document allocates code points for the use of RSASSA-PKCS1-v1_5 with
client certificates in TLS 1.3. This removes an obstacle for some deployments
to migrate to TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/tls13-pkcs1/draft-ietf-tls-tls13-pkcs1.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-pkcs1/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls13-pkcs1"/>.</t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.3 <xref target="RFC8446"/> removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in
CertificateVerify messages in favor of RSASSA-PSS. While RSASSA-PSS is a
long-established signature algorithm, some legacy hardware cryptographic devices
lack support for it. While uncommon in TLS servers, these devices are sometimes
used by TLS clients for client certificates.</t>
      <t>For example, Trusted Platform Modules (TPMs) are ubiquitous hardware
cryptographic devices that are often used to protect TLS client certificate
private keys. However, a large number of TPMs are unable to produce RSASSA-PSS
signatures compatible with TLS 1.3. TPM specifications prior to 2.0 did not
define RSASSA-PSS support (see Section 5.8.1 of <xref target="TPM12"/>). TPM 2.0
includes RSASSA-PSS, but only those TPM 2.0 devices compatible with FIPS 186-4
can be relied upon to use the salt length matching the digest length, as
required for compatibility with TLS 1.3 (see Appendix B.7 of <xref target="TPM2"/>).</t>
      <t>TLS connections that rely on such devices cannot migrate to TLS 1.3. Staying on
TLS 1.2 leaks the client certificate to network attackers and additionally
prevents such deployments from protecting traffic against retroactive
decryption by an attacker with a quantum computer.</t>
      <t>Moreover, TLS negotiates the protocol version before client certificates, so
clients and servers cannot smoothly transition unaffected connections to
TLS 1.3. As a result, this issue is not limited to individual connections
that use affected devices. It prevents entire deployments from migrating to
TLS 1.3. See <xref target="security-considerations"/> for further discussion.</t>
      <t>This document allocates code points to use these legacy keys with client
certificates in TLS 1.3.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="pkcs1-v15-signaturescheme-types">
      <name>PKCS#1 v1.5 SignatureScheme Types</name>
      <t>The following SignatureScheme values are defined for use with TLS 1.3.</t>
      <artwork><![CDATA[
    enum {
        rsa_pkcs1_sha256_legacy(0x0420),
        rsa_pkcs1_sha384_legacy(0x0520),
        rsa_pkcs1_sha512_legacy(0x0620),
    } SignatureScheme;
]]></artwork>
      <t>The above code points indicate a signature algorithm using RSASSA-PKCS1-v1_5
<xref target="RFC8017"/> with the corresponding hash algorithm as defined in
<xref target="SHS"/>. They are only defined for signatures in
the client CertificateVerify message and are not defined for use in other
contexts. In particular, servers intending to advertise support for
RSASSA-PKCS1-v1_5 signatures in the certificates themselves should use the
<tt>rsa_pkcs1_*</tt> constants defined in <xref target="RFC8446"/>.</t>
      <t>Clients MUST NOT advertise these values in the <tt>signature_algorithms</tt> extension
of the ClientHello. They MUST NOT accept these values in the server
CertificateVerify message.</t>
      <t>Servers that wish to support clients authenticating with legacy
RSASSA-PKCS1-v1_5-only keys MAY send these values in the
<tt>signature_algorithms</tt> extension of the CertificateRequest message and accept
them in the client CertificateVerify message. Servers MUST NOT accept these code
points if not offered in the CertificateRequest message.</t>
      <t>Clients with such legacy keys MAY negotiate the use of these signature
algorithms if offered by the server.  Clients SHOULD NOT negotiate them with
keys that support RSASSA-PSS.</t>
      <t>TLS implementations SHOULD disable these code points by default.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to this document, legacy RSA keys would prevent client certificate
deployments from adopting TLS 1.3. The new code points allow such deployments
to upgrade without replacing the keys. TLS 1.3 fixes a privacy flaw
<xref target="PRIVACY"/> with client certificates, so
upgrading is a particular benefit to these deployments. TLS 1.3 is also a
prequisite for post-quantum key exchanges <xref target="I-D.ietf-tls-hybrid-design"/>,
necessary for deployments to protect traffic against retroactive decryption by
an attacker with a quantum computer.</t>
      <t>Additionally, TLS negotiates protocol versions before client certificates.
Clients send ClientHellos without knowing whether the server will request to
authenticate with legacy keys. Conversely, servers respond with a TLS
version and CertificateRequest without knowing if the client will then
respond with a legacy key. If the client and server, respectively, offer and
negotiate TLS 1.3, the connection will fail due to the legacy key, when it
previously succeeded at TLS 1.2.</t>
      <t>To recover from this failure, one side must globally disable TLS 1.3 or the
client must implement an external fallback. Disabling TLS 1.3 impacts
connections that would otherwise be unaffected by this issue, while external
fallbacks break TLS's security analysis and may introduce vulnerabilities
<xref target="POODLE"/>. The new code points reduce the pressure on implementations to select
one of these problematic mitigations and unblocks TLS 1.3 deployment.</t>
      <t>At the same time, the new code points also reduce the pressure on
implementations to migrate to RSASSA-PSS. The above considerations do not apply
to server keys, so these new code points are forbidden for use with server
certificates. RSASSA-PSS continues to be required for TLS 1.3 servers using RSA
keys. This minimizes the impact to only those cases necessary to unblock TLS
1.3 deployment.</t>
      <t>Finally, when implemented incorrectly, RSASSA-PKCS1-v1_5 admits signature
forgeries <xref target="MFSA201473"/>. Implementations  producing or verifying signatures
with these algorithms MUST implement RSASSA-PKCS1-v1_5 as specified in section
8.2 of <xref target="RFC8017"/>. In particular, clients MUST include the mandatory NULL
parameter in the DigestInfo structure and produce a valid DER <xref target="X690"/>
encoding. Servers MUST reject signatures which do not meet these requirements.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entries in the
TLS SignatureScheme registry, defined in <xref target="RFC8446"/>. The "Recommended" column
should be set to "N", and the "Reference" column should be set to this document.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0420</td>
            <td align="left">
              <tt>rsa_pkcs1_sha256_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0520</td>
            <td align="left">
              <tt>rsa_pkcs1_sha384_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0620</td>
            <td align="left">
              <tt>rsa_pkcs1_sha512_legacy</tt></td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2002"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
        </reference>
        <reference anchor="TPM12" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">
          <front>
            <title>TPM Main Specification Level 2 Version 1.2, Revision 116, Part 2 - Structures of the TPM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2011" month="March" day="01"/>
          </front>
        </reference>
        <reference anchor="TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59, Part 1: Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November" day="08"/>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SHS">
          <front>
            <title>Secure hash standard</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MFSA201473" target="https://www.mozilla.org/en-US/security/advisories/mfsa2014-73/">
          <front>
            <title>RSA Signature Forgery in NSS</title>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <date year="2014" month="September" day="23"/>
          </front>
        </reference>
        <reference anchor="POODLE" target="https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">
          <front>
            <title>This POODLE bites: exploiting the SSL 3.0 fallback</title>
            <author initials="B." surname="Moeller" fullname="Bodo Moeller">
              <organization/>
            </author>
            <date year="2014" month="October" day="14"/>
          </front>
        </reference>
        <reference anchor="PRIVACY">
          <front>
            <title>Push away your privacy: Precise user tracking based on TLS client certificate authentication</title>
            <author fullname="Matthias Wachs" initials="M." surname="Wachs">
              <organization/>
            </author>
            <author fullname="Quirin Scheitle" initials="Q." surname="Scheitle">
              <organization/>
            </author>
            <author fullname="Georg Carle" initials="G." surname="Carle">
              <organization/>
            </author>
            <date month="June" year="2017"/>
          </front>
          <seriesInfo name="2017 Network Traffic Measurement and Analysis Conference (TMA)" value="pp. 1-9"/>
          <seriesInfo name="DOI" value="10.23919/tma.2017.8002897"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="October" year="2024"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-11"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
