<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls13-pkcs1-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.2 -->
  <front>
    <title abbrev="Legacy PKCS#1 codepoints for TLS 1.3">Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls13-pkcs1-06"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Popov" fullname="Andrei Popov">
      <organization>Microsoft Corp.</organization>
      <address>
        <email>andreipo@microsoft.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="10"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 76?>

<t>This document allocates code points for the use of RSASSA-PKCS1-v1_5 with
client certificates in TLS 1.3. This removes an obstacle for some deployments
to migrate to TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://tlswg.github.io/tls13-pkcs1/draft-ietf-tls-tls13-pkcs1.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls13-pkcs1/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls13-pkcs1"/>.</t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.3 <xref target="RFC8446"/> removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in
CertificateVerify messages in favor of RSASSA-PSS. While RSASSA-PSS is a
long-established signature algorithm, some legacy hardware cryptographic devices
lack support for it. While uncommon in TLS servers, these devices are sometimes
used by TLS clients for client certificates.</t>
      <t>For example, Trusted Platform Modules (TPMs) are ubiquitous hardware
cryptographic devices that are often used to protect TLS client certificate
private keys. However, a large number of TPMs are unable to produce RSASSA-PSS
signatures compatible with TLS 1.3. TPM specifications prior to 2.0 did not
define RSASSA-PSS support (see Section 5.8.1 of <xref target="TPM12"/>). TPM 2.0
includes RSASSA-PSS, but only those TPM 2.0 devices compatible with FIPS 186-4
can be relied upon to use the salt length matching the digest length, as
required for compatibility with TLS 1.3 (see Appendix B.7 of <xref target="TPM2"/>).</t>
      <t>TLS connections that rely on such devices cannot migrate to TLS 1.3. Staying on
TLS 1.2 leaks the client certificate to network attackers
<xref target="PRIVACY"/> and additionally prevents such
deployments from protecting traffic against retroactive decryption by an
attacker with a quantum computer <xref target="I-D.ietf-tls-hybrid-design"/>.</t>
      <t>Additionally, TLS negotiates protocol versions before client certificates.
Clients send ClientHellos without knowing whether the server will request to
authenticate with legacy keys. Conversely, servers respond with a TLS
version and CertificateRequest without knowing if the client will then
respond with a legacy key. If the client and server, respectively, offer and
negotiate TLS 1.3, the connection will fail due to the legacy key, when it
previously succeeded at TLS 1.2.</t>
      <t>To recover from this failure, one side must globally disable TLS 1.3 or the
client must implement an external fallback. Disabling TLS 1.3 impacts
connections that would otherwise be unaffected by this issue, while external
fallbacks break TLS's security analysis and may introduce vulnerabilities
<xref target="POODLE"/>.</t>
      <t>This document allocates code points to use these legacy keys with client
certificates in TLS 1.3. This reduces the pressure on implementations to select
one of these problematic mitigations and unblocks TLS 1.3 deployment.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="pkcs1-v15-signaturescheme-types">
      <name>PKCS#1 v1.5 SignatureScheme Types</name>
      <t>The following SignatureScheme values are defined for use with TLS 1.3.</t>
      <artwork><![CDATA[
    enum {
        rsa_pkcs1_sha256_legacy(0x0420),
        rsa_pkcs1_sha384_legacy(0x0520),
        rsa_pkcs1_sha512_legacy(0x0620),
    } SignatureScheme;
]]></artwork>
      <t>The above code points indicate a signature algorithm using RSASSA-PKCS1-v1_5
<xref target="RFC8017"/> with the corresponding hash algorithm as defined in
<xref target="SHS"/>. They are only defined for signatures in
the client CertificateVerify message and are not defined for use in other
contexts. In particular, servers intending to advertise support for
RSASSA-PKCS1-v1_5 signatures in the certificates themselves should use the
<tt>rsa_pkcs1_*</tt> constants defined in <xref target="RFC8446"/>.</t>
      <t>Clients MUST NOT advertise these values in the <tt>signature_algorithms</tt> extension
of the ClientHello. They MUST NOT accept these values in the server
CertificateVerify message.</t>
      <t>Servers that wish to support clients authenticating with legacy
RSASSA-PKCS1-v1_5-only keys MAY send these values in the
<tt>signature_algorithms</tt> extension of the CertificateRequest message and accept
them in the client CertificateVerify message. Servers MUST NOT accept these code
points if not offered in the CertificateRequest message.</t>
      <t>Clients with such legacy keys MAY negotiate the use of these signature
algorithms if offered by the server.  Clients SHOULD NOT negotiate them with
keys that support RSASSA-PSS, though this may not be practical to determine in
all applications. For example, attempting to test a key for support might
display a message to the user or have other side effects.</t>
      <t>TLS implementations SHOULD disable these code points by default. See
<xref target="security-considerations"/>.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The considerations in <xref target="introduction"/> do not apply to server keys, so these new
code points are forbidden for use with server certificates. RSASSA-PSS continues
to be required for TLS 1.3 servers using RSA keys. This minimizes the impact to
only those cases necessary to unblock TLS 1.3 deployment.</t>
      <t>When implemented incorrectly, RSASSA-PKCS1-v1_5 admits signature
forgeries <xref target="MFSA201473"/>. Implementations producing or verifying signatures
with these algorithms MUST implement RSASSA-PKCS1-v1_5 as specified in section
8.2 of <xref target="RFC8017"/>. In particular, clients MUST include the mandatory NULL
parameter in the DigestInfo structure and produce a valid DER <xref target="X690"/>
encoding. Servers MUST reject signatures which do not meet these requirements.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entries in the
TLS SignatureScheme registry, defined in <xref target="RFC8446"/>. The "Recommended" column
should be set to "N", and the "Reference" column should be set to this document.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0420</td>
            <td align="left">
              <tt>rsa_pkcs1_sha256_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0520</td>
            <td align="left">
              <tt>rsa_pkcs1_sha384_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0620</td>
            <td align="left">
              <tt>rsa_pkcs1_sha512_legacy</tt></td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2002"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
        </reference>
        <reference anchor="TPM12" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">
          <front>
            <title>TPM Main Specification Level 2 Version 1.2, Revision 116, Part 2 - Structures of the TPM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2011" month="March" day="01"/>
          </front>
        </reference>
        <reference anchor="TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59, Part 1: Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November" day="08"/>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SHS">
          <front>
            <title>Secure hash standard</title>
            <author>
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology (U.S.)</refcontent>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MFSA201473" target="https://www.mozilla.org/en-US/security/advisories/mfsa2014-73/">
          <front>
            <title>RSA Signature Forgery in NSS</title>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <date year="2014" month="September" day="23"/>
          </front>
        </reference>
        <reference anchor="POODLE" target="https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">
          <front>
            <title>This POODLE bites: exploiting the SSL 3.0 fallback</title>
            <author initials="B." surname="Moeller" fullname="Bodo Moeller">
              <organization/>
            </author>
            <date year="2014" month="October" day="14"/>
          </front>
        </reference>
        <reference anchor="PRIVACY">
          <front>
            <title>Push away your privacy: Precise user tracking based on TLS client certificate authentication</title>
            <author fullname="Matthias Wachs" initials="M." surname="Wachs">
              <organization/>
            </author>
            <author fullname="Quirin Scheitle" initials="Q." surname="Scheitle">
              <organization/>
            </author>
            <author fullname="Georg Carle" initials="G." surname="Carle">
              <organization/>
            </author>
            <date month="June" year="2017"/>
          </front>
          <seriesInfo name="2017 Network Traffic Measurement and Analysis Conference (TMA)" value="pp. 1-9"/>
          <seriesInfo name="DOI" value="10.23919/tma.2017.8002897"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa and Meta</organization>
            </author>
            <date day="7" month="September" year="2025"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if a way is found to defeat the encryption for all but
   one of the component algorithms.  It is motivated by transition to
   post-quantum cryptography.  This document provides a construction for
   hybrid key exchange in the Transport Layer Security (TLS) protocol
   version 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-16"/>
        </reference>
      </references>
    </references>
    <?line 200?>

<section numbered="false" anchor="acknowledgements">
      <name>Acknowledgements</name>
      <t>Thanks to Rifaat Shekh-Yusef, Martin Thomson, and Paul Wouters for providing feedback on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
