<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.3.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls13-pkcs1-03" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="Legacy PKCS#1 codepoints for TLS 1.3">Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls13-pkcs1-03"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Popov" fullname="Andrei Popov">
      <organization>Microsoft Corp.</organization>
      <address>
        <email>andreipo@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="May" day="12"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 76?>

<t>This document allocates code points for the use of RSASSA-PKCS1-v1_5 with
client certificates in TLS 1.3. This removes an obstacle for some deployments
to migrate to TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/tls13-pkcs1/draft-ietf-tls-tls13-pkcs1.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-pkcs1/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls13-pkcs1"/>.</t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.3 <xref target="RFC8446"/> removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in
CertificateVerify messages in favor of RSASSA-PSS. While RSASSA-PSS is a
long-established signature algorithm, some legacy hardware cryptographic devices
lack support for it. While uncommon in TLS servers, these devices are sometimes
used by TLS clients for client certificates.</t>
      <t>For example, Trusted Platform Modules (TPMs) are ubiquitous hardware
cryptographic devices that are often used to protect TLS client certificate
private keys. However, a large number of TPMs are unable to produce RSASSA-PSS
signatures compatible with TLS 1.3. TPM specifications prior to 2.0 did not
define RSASSA-PSS support (see Section 5.8.1 of <xref target="TPM12"/>). TPM 2.0
includes RSASSA-PSS, but only those TPM 2.0 devices compatible with FIPS 186-4
can be relied upon to use the salt length matching the digest length, as
required for compatibility with TLS 1.3 (see Appendix B.7 of <xref target="TPM2"/>).</t>
      <t>TLS connections that rely on such devices cannot migrate to TLS 1.3. Staying on
TLS 1.2 leaks the client certificate to network attackers and additionally
prevents such deployments from protecting traffic against retroactive
decryption by an attacker with a quantum computer.</t>
      <t>Moreover, TLS negotiates the protocol version before client certificates, so
clients and servers cannot smoothly transition unaffected connections to
TLS 1.3. As a result, this issue is not limited to individual connections
that use affected devices. It prevents entire deployments from migrating to
TLS 1.3. See <xref target="security-considerations"/> for further discussion.</t>
      <t>This document allocates code points to use these legacy keys with client
certificates in TLS 1.3.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="pkcs1-v15-signaturescheme-types">
      <name>PKCS#1 v1.5 SignatureScheme Types</name>
      <t>The following SignatureScheme values are defined for use with TLS 1.3.</t>
      <artwork><![CDATA[
    enum {
        rsa_pkcs1_sha256_legacy(0x0420),
        rsa_pkcs1_sha384_legacy(0x0520),
        rsa_pkcs1_sha512_legacy(0x0620),
    } SignatureScheme;
]]></artwork>
      <t>The above code points indicate a signature algorithm using RSASSA-PKCS1-v1_5
<xref target="RFC8017"/> with the corresponding hash algorithm as defined in
<xref target="SHS"/>. They are only defined for signatures in
the client CertificateVerify message and are not defined for use in other
contexts. In particular, servers intending to advertise support for
RSASSA-PKCS1-v1_5 signatures in the certificates themselves should use the
<tt>rsa_pkcs1_*</tt> constants defined in <xref target="RFC8446"/>.</t>
      <t>Clients MUST NOT advertise these values in the <tt>signature_algorithms</tt> extension
of the ClientHello. They MUST NOT accept these values in the server
CertificateVerify message.</t>
      <t>Servers that wish to support clients authenticating with legacy
RSASSA-PKCS1-v1_5-only keys MAY send these values in the
<tt>signature_algorithms</tt> extension of the CertificateRequest message and accept
them in the client CertificateVerify message. Servers MUST NOT accept these code
points if not offered in the CertificateRequest message.</t>
      <t>Clients with such legacy keys MAY negotiate the use of these signature
algorithms if offered by the server.  Clients SHOULD NOT negotiate them with
keys that support RSASSA-PSS.</t>
      <t>TLS implementations SHOULD disable these code points by default.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to this document, legacy RSA keys would prevent client certificate
deployments from adopting TLS 1.3. The new code points allow such deployments
to upgrade without replacing the keys. TLS 1.3 fixes a privacy flaw
<xref target="PRIVACY"/> with client certificates, so
upgrading is a particular benefit to these deployments. TLS 1.3 is also a
prequisite for post-quantum key exchanges <xref target="I-D.ietf-tls-hybrid-design"/>,
necessary for deployments to protect traffic against retroactive decryption by
an attacker with a quantum computer.</t>
      <t>Additionally, TLS negotiates protocol versions before client certificates.
Clients send ClientHellos without knowing whether the server will request to
authenticate with legacy keys. Conversely, servers respond with a TLS
version and CertificateRequest without knowing if the client will then
respond with a legacy key. If the client and server, respectively, offer and
negotiate TLS 1.3, the connection will fail due to the legacy key, when it
previously succeeded at TLS 1.2.</t>
      <t>To recover from this failure, one side must globally disable TLS 1.3 or the
client must implement an external fallback. Disabling TLS 1.3 impacts
connections that would otherwise be unaffected by this issue, while external
fallbacks break TLS's security analysis and may introduce vulnerabilities
<xref target="POODLE"/>. The new code points reduce the pressure on implementations to select
one of these problematic mitigations and unblocks TLS 1.3 deployment.</t>
      <t>At the same time, the new code points also reduce the pressure on
implementations to migrate to RSASSA-PSS. The above considerations do not apply
to server keys, so these new code points are forbidden for use with server
certificates. RSASSA-PSS continues to be required for TLS 1.3 servers using RSA
keys. This minimizes the impact to only those cases necessary to unblock TLS
1.3 deployment.</t>
      <t>Finally, when implemented incorrectly, RSASSA-PKCS1-v1_5 admits signature
forgeries <xref target="MFSA201473"/>. Implementations  producing or verifying signatures
with these algorithms MUST implement RSASSA-PKCS1-v1_5 as specified in section
8.2 of <xref target="RFC8017"/>. In particular, clients MUST include the mandatory NULL
parameter in the DigestInfo structure and produce a valid DER <xref target="X690"/>
encoding. Servers MUST reject signatures which do not meet these requirements.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entries in the
TLS SignatureScheme registry, defined in <xref target="RFC8446"/>. The "Recommended" column
should be set to "N", and the "Reference" column should be set to this document.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0420</td>
            <td align="left">
              <tt>rsa_pkcs1_sha256_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0520</td>
            <td align="left">
              <tt>rsa_pkcs1_sha384_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0620</td>
            <td align="left">
              <tt>rsa_pkcs1_sha512_legacy</tt></td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2002"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
        </reference>
        <reference anchor="TPM12" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">
          <front>
            <title>TPM Main Specification Level 2 Version 1.2, Revision 116, Part 2 - Structures of the TPM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2011" month="March" day="01"/>
          </front>
        </reference>
        <reference anchor="TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59, Part 1: Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November" day="08"/>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SHS">
          <front>
            <title>Secure hash standard</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MFSA201473" target="https://www.mozilla.org/en-US/security/advisories/mfsa2014-73/">
          <front>
            <title>RSA Signature Forgery in NSS</title>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <date year="2014" month="September" day="23"/>
          </front>
        </reference>
        <reference anchor="POODLE" target="https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">
          <front>
            <title>This POODLE bites: exploiting the SSL 3.0 fallback</title>
            <author initials="B." surname="Moeller" fullname="Bodo Moeller">
              <organization/>
            </author>
            <date year="2014" month="October" day="14"/>
          </front>
        </reference>
        <reference anchor="PRIVACY">
          <front>
            <title>Push away your privacy: Precise user tracking based on TLS client certificate authentication</title>
            <author fullname="Matthias Wachs" initials="M." surname="Wachs">
              <organization/>
            </author>
            <author fullname="Quirin Scheitle" initials="Q." surname="Scheitle">
              <organization/>
            </author>
            <author fullname="Georg Carle" initials="G." surname="Carle">
              <organization/>
            </author>
            <date month="June" year="2017"/>
          </front>
          <seriesInfo name="2017 Network Traffic Measurement and Analysis Conference (TMA)" value="pp. 1-9"/>
          <seriesInfo name="DOI" value="10.23919/tma.2017.8002897"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="14" month="January" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-12"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
