<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-madden-jose-deprecate-none-rsa15-01" category="std" consensus="true" submissionType="IETF" updates="7518" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title>JOSE: Deprecate 'none' and 'RSA1_5'</title>
    <seriesInfo name="Internet-Draft" value="draft-madden-jose-deprecate-none-rsa15-01"/>
    <author fullname="Neil Madden">
      <organization>Illuminated Security Ltd</organization>
      <address>
        <email>neil@illuminated-security.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="12"/>
    <area>Security</area>
    <workgroup>Javascript Object Signing and Encryption</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 70?>

<t>This draft updates <xref target="RFC7518"/> to deprecate the JWS algorithm "none" and the JWE algorithm
"RSA1_5". These algorithms have known security weaknesses.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://NeilMadden.github.io/jose-deprecate-none-rsa1_5/draft-madden-jose-deprecate-none-rsa15.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-madden-jose-deprecate-none-rsa15/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Javascript Object Signing and Encryption Working Group mailing list (<eref target="mailto:jose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/jose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/jose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NeilMadden/jose-deprecate-none-rsa1_5"/>.</t>
    </note>
  </front>
  <middle>
    <?line 75?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>JSON Web Algorithms (JWA, <xref target="RFC7518"/>) introduced several standard algorithms for both JSON Web
Signature (JWS) and JSON Web Encryption (JWE). Many of these algorithms have stood the test of time
and are still in widespread use. However, some algorithms have proved to be difficult to implement
correctly leading to exploitable vulnerabilities. This draft deprecates two such algorithms:</t>
      <ul spacing="normal">
        <li>
          <t>The JWS "none" algorithm, which indicates that no security is applied to the message at all.</t>
        </li>
        <li>
          <t>The JWE "RSA1_5" algorithm, which indicates RSA encryption with PKCS#1 version 1.5 padding.</t>
        </li>
      </ul>
      <section anchor="the-none-algorithm">
        <name>The 'none' algorithm</name>
        <t>The "none" algorithm creates an Unsecured JWS, whose contents are completely unsecured as the name
implies. Despite strong guidance in the original RFC around not accepting Unsecured JWS by default,
many implementations have had serious bugs due to accepting this algorithm. In some cases, this has
led to a complete loss of security as authenticity and integrity checking can be disabled by an
adversary simply by changing the algorithm ("alg") header in the JWS. The website <xref target="howmanydays"/>
tracks public vulnerabilities due to implementations mistakenly accepting the "none" algorithm. It
currently lists 12 reports, many of which have high impact ratings. The following is a partial list
of issues known to have been caused by misuse of the "none" algorithm, with a Common Vulnerability
Enumeration <xref target="CVE"/> identifier, and a Common Vulnerability Scoring System <xref target="CVSS"/> score
indicating the severity of the impact:</t>
        <ul spacing="normal">
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2018-1000531">CVE-2018-1000531</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2017-10862">CVE-2017-10862</eref> - CVSS: 5.3 (Medium)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2022-23540">CVE-2022-23540</eref> - CVSS: 7.6 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2020-15957">CVE-2020-15957</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29500">CVE-2021-29500</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29451">CVE-2021-29451</eref> - CVSS: 9.1 (Critical)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29455">CVE-2021-29455</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-22160">CVE-2021-22160</eref> - CVSS: 9.8 (Critical)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-32631">CVE-2021-32631</eref> - CVSS: 6.5 (Medium)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2023-29357">CVE-2023-29357</eref> - CVSS: 9.8 (Critical)</t>
          </li>
        </ul>
        <t>Many other vulnerabilities have been reported without an accompanying CVE, which we do not list here.</t>
        <t>Although there are some legitimate use-cases for Unsecured JWS, these are relatively few in number
and can easily be satisfied by alternative means. The small risk of breaking
some of these use-cases is far outweighed by the improvement in security for the majority of
JWS users who may be impacted by accidental acceptance of the "none" algorithm.</t>
      </section>
      <section anchor="the-rsa15-algorithm">
        <name>The 'RSA1_5' algorithm</name>
        <t>The "RSA1_5" algorithm implements RSA encryption using PKCS#1 version 1.5 padding <xref target="RFC8017"/>. This
padding mode has long been known to have security issues, since at least Bleichenbacher's attack in
1998. It was supported in JWE due to the wide deployment of this algorithm, especially in legacy
hardware. However, more secure replacements such as OAEP <xref target="RFC8017"/> or elliptic curve encryption
algorithms are now widely available. NIST has disallowed the use of this encryption mode for federal
use since the end of 2023 <xref target="NIST.SP800-131r2"/> and a CFRG draft <xref target="I-D.kario-rsa-guidance"/> also deprecates
this encryption mode for IETF protocols. This document therefore also deprecates this algorithm for
JWE.</t>
      </section>
      <section anchor="guidance-on-deprecation">
        <name>Guidance on deprecation</name>
        <t>Both of the algorithms listed above are deprecated for use in JWS and JWE. JOSE library developers
<bcp14>SHOULD</bcp14> deprecate support for these algorithms and commit to a timeline for removal. Application
developers <bcp14>SHOULD</bcp14> disable support for these algorithms by default. New specifications building on
top of JOSE <bcp14>MUST NOT</bcp14> allow the use of either algorithm.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>No security issues are introduced by this specification.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="jose-algorithm-deprecations">
        <name>JOSE Algorithm Deprecations</name>
        <t>The following changes are to be made to the IANA JOSE Web Signature and Encryption Algorithms registry:</t>
        <ul spacing="normal">
          <li>
            <t>For the entry with Algorithm Name "none", update the JOSE Implementation Requirements to "Deprecated".</t>
          </li>
          <li>
            <t>For the entry with Algorithm Name "RSA1_5", update the JOSE Implementation Requirements to "Deprecated".</t>
          </li>
        </ul>
      </section>
      <section anchor="updated-review-instructions-for-designated-experts">
        <name>Updated Review Instructions for Designated Experts</name>
        <t>The review instructions for the designated experts for the IANA "JSON Web Signature and Encryption Algorithms"
registry <xref target="IANA.JOSE.Algorithms"/> in Section 7.1 of <xref target="RFC7518"/> are updated to add this additional review criteria:</t>
        <ul spacing="normal">
          <li>
            <t>For JWS signature algorithms, only algorithms that meet the standard security goal of existential unforgeability
under a chosen message attack (EUF-CMA) should be considered for approval.</t>
          </li>
          <li>
            <t>For JWE key management algorithms (specified with the "alg" header), only algorithms that meet the standard
security goal of indistinguishability under an adaptive chosen ciphertext attack (IND-CCA2) should be considered
for approval.</t>
          </li>
          <li>
            <t>For JWE content encryption methods (specified with the "enc" header), only algorithms that meet the standard
security goal of authenticated encryption with associated data (AEAD) should be considered for approval.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="howmanydays" target="https://github.com/zofrex/howmanydayssinceajwtalgnonevuln/blob/deploy/data/vulns.yml">
          <front>
            <title>How Many Days Has It Been Since a JWT alg:none Vulnerability?</title>
            <author fullname="James Sanderson">
              <organization/>
            </author>
            <date year="2023" month="September" day="25"/>
          </front>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.kario-rsa-guidance">
          <front>
            <title>Implementation Guidance for the PKCS #1 RSA Cryptography Specification</title>
            <author fullname="Alicja Kario" initials="A." surname="Kario">
              <organization>Red Hat, Inc.</organization>
            </author>
            <date day="22" month="November" year="2023"/>
            <abstract>
              <t>   This document specifies additions and amendments to RFC 8017.
   Specifically, it provides guidance to implementers of the standard to
   protect against side-channel attacks.  It also deprecates the RSAES-
   PKCS-v1_5 encryption scheme, but provides an alternative depadding
   algorithm that protects against side-channel attacks raising from
   users of vulnerable APIs.  The purpose of this specification is to
   increase security of RSA implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-kario-rsa-guidance-02"/>
        </reference>
        <reference anchor="NIST.SP800-131r2" target="https://csrc.nist.gov/pubs/sp/800/131/a/r2/final">
          <front>
            <title>NIST SP 800-131A Rev. 2: Transitioning the Use of Cryptographic Algorithms and Key Lengths</title>
            <author fullname="Elaine Barker">
              <organization>NIST</organization>
            </author>
            <author fullname="Allen Roginsky">
              <organization>NIST</organization>
            </author>
            <date year="2019" month="March" day="21"/>
          </front>
        </reference>
        <reference anchor="CVE" target="https://cve.mitre.org">
          <front>
            <title>Common Vulnerability Enumeration Database</title>
            <author>
              <organization>MITRE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CVSS" target="https://www.first.org/cvss/">
          <front>
            <title>Common Vulnerability Scoring System</title>
            <author>
              <organization>FIRST</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.JOSE.Algorithms" target="https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-algorithms">
          <front>
            <title>JOSE Algorithms</title>
            <author>
              <organization>IANA</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 184?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
