<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.2 (Ruby 3.2.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tls-tls13-pkcs1-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.18.2 -->
  <front>
    <title abbrev="Legacy PKCS#1 codepoints for TLS 1.3">Legacy RSASSA-PKCS1-v1_5 codepoints for TLS 1.3</title>
    <seriesInfo name="Internet-Draft" value="draft-tls-tls13-pkcs1-00"/>
    <author initials="D." surname="Benjamin" fullname="David Benjamin">
      <organization>Google LLC</organization>
      <address>
        <email>davidben@google.com</email>
      </address>
    </author>
    <author initials="A." surname="Popov" fullname="Andrei Popov">
      <organization>Microsoft Corp.</organization>
      <address>
        <email>andreipo@microsoft.com</email>
      </address>
    </author>
    <date year="2023" month="November" day="29"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <abstract>
      <?line 76?>

<t>This document allocates code points for the use of RSASSA-PKCS1-v1_5 with
client certificates in TLS 1.3. This removes an obstacle for some deployments
to migrate to TLS 1.3.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://davidben.github.io/tls13-pkcs1/draft-tls-tls13-pkcs1.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tls-tls13-pkcs1/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/davidben/tls13-pkcs1"/>.</t>
    </note>
  </front>
  <middle>
    <?line 82?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.3 <xref target="RFC8446"/> removed support for RSASSA-PKCS1-v1_5 <xref target="RFC8017"/> in
CertificateVerify messages in favor of RSASSA-PSS. While RSASSA-PSS is a
long-established signature algorithm, some legacy hardware cryptographic devices
lack support for it. While uncommon in TLS servers, these devices are sometimes
used by TLS clients for client certificates.</t>
      <t>For example, Trusted Platform Modules (TPMs) are ubiquitous hardware
cryptographic devices that are often used to protect TLS client certificate
private keys. However, a large number of TPMs are unable to produce RSASSA-PSS
signatures compatible with TLS 1.3. TPM specifications prior to 2.0 did not
define RSASSA-PSS support (see Section 5.8.1 of <xref target="TPM12"/>). TPM 2.0
includes RSASSA-PSS, but only those TPM 2.0 devices compatible with FIPS 186-4
can be relied upon to use the salt length matching the digest length, as
required for compatibility with TLS 1.3 (see Appendix B.7 of <xref target="TPM2"/>).</t>
      <t>TLS connections that rely on such devices cannot migrate to TLS 1.3. Staying on
TLS 1.2 leaks the client certificate to network attackers and additionally
prevents such deployments from protecting traffic against retroactive
decryption by an attacker with a quantum computer.</t>
      <t>Moreover, TLS negotiates the protocol version before client certificates, so
clients and servers cannot smoothly transition unaffected connections to
TLS 1.3. As a result, this issue is not limited to individual connections
that use affected devices. It prevents entire deployments from migrating to
TLS 1.3. See <xref target="security-considerations"/> for further discussion.</t>
      <t>This document allocates code points to use these legacy keys with client
certificates in TLS 1.3.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD",
"SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/>
when, and only when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="pkcs1-v15-signaturescheme-types">
      <name>PKCS#1 v1.5 SignatureScheme Types</name>
      <t>The following SignatureScheme values are defined for use with TLS 1.3.</t>
      <artwork><![CDATA[
    enum {
        rsa_pkcs1_sha256_legacy(0x0420),
        rsa_pkcs1_sha384_legacy(0x0520),
        rsa_pkcs1_sha512_legacy(0x0620),
    } SignatureScheme;
]]></artwork>
      <t>The above code points indicate a signature algorithm using RSASSA-PKCS1-v1_5
<xref target="RFC8017"/> with the corresponding hash algorithm as defined in
<xref target="SHS"/>. They are only defined for signatures in
the client CertificateVerify message and are not defined for use in other
contexts. In particular, servers intending to advertise support for
RSASSA-PKCS1-v1_5 signatures in the certificates themselves should use the
<tt>rsa_pkcs1_*</tt> constants defined in <xref target="RFC8446"/>.</t>
      <t>Clients MUST NOT advertise these values in the <tt>signature_algorithms</tt> extension
of the ClientHello. They MUST NOT accept these values in the server
CertificateVerify message.</t>
      <t>Servers that wish to support clients authenticating with legacy
RSASSA-PKCS1-v1_5-only keys MAY send these values in the
<tt>signature_algorithms</tt> extension of the CertificateRequest message and accept
them in the client CertificateVerify message. Servers MUST NOT accept these code
points if not offered in the CertificateRequest message.</t>
      <t>Clients with such legacy keys MAY negotiate the use of these signature
algorithms if offered by the server.  Clients SHOULD NOT negotiate them with
keys that support RSASSA-PSS.</t>
      <t>TLS implementations SHOULD disable these code points by default.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Prior to this document, legacy RSA keys would prevent client certificate
deployments from adopting TLS 1.3. The new code points allow such deployments
to upgrade without replacing the keys. TLS 1.3 fixes a privacy flaw
<xref target="PRIVACY"/> with client certificates, so
upgrading is a particular benefit to these deployments. TLS 1.3 is also a
prequisite for post-quantum key exchanges <xref target="I-D.ietf-tls-hybrid-design"/>,
necessary for deployments to protect traffic against retroactive decryption by
an attacker with a quantum computer.</t>
      <t>Additionally, TLS negotiates protocol versions before client certificates.
Clients send ClientHellos without knowing whether the server will request to
authenticate with legacy keys. Conversely, servers respond with a TLS
version and CertificateRequest without knowing if the client will then
respond with a legacy key. If the client and server, respectively, offer and
negotiate TLS 1.3, the connection will fail due to the legacy key, when it
previously succeeded at TLS 1.2.</t>
      <t>To recover from this failure, one side must globally disable TLS 1.3 or the
client must implement an external fallback. Disabling TLS 1.3 impacts
connections that would otherwise be unaffected by this issue, while external
fallbacks break TLS's security analysis and may introduce vulnerabilities
<xref target="POODLE"/>. The new code points reduce the pressure on implementations to select
one of these problematic mitigations and unblocks TLS 1.3 deployment.</t>
      <t>At the same time, the new code points also reduce the pressure on
implementations to migrate to RSASSA-PSS. The above considerations do not apply
to server keys, so these new code points are forbidden for use with server
certificates. RSASSA-PSS continues to be required for TLS 1.3 servers using RSA
keys. This minimizes the impact to only those cases necessary to unblock TLS
1.3 deployment.</t>
      <t>Finally, when implemented incorrectly, RSASSA-PKCS1-v1_5 admits signature
forgeries <xref target="MFSA201473"/>. Implementations  producing or verifying signatures
with these algorithms MUST implement RSASSA-PKCS1-v1_5 as specified in section
8.2 of <xref target="RFC8017"/>. In particular, clients MUST include the mandatory NULL
parameter in the DigestInfo structure and produce a valid DER <xref target="X690"/>
encoding. Servers MUST reject signatures which do not meet these requirements.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to create the following entries in the
TLS SignatureScheme registry, defined in <xref target="RFC8446"/>. The "Recommended" column
should be set to "N", and the "Reference" column should be set to this document.</t>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x0420</td>
            <td align="left">
              <tt>rsa_pkcs1_sha256_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0520</td>
            <td align="left">
              <tt>rsa_pkcs1_sha384_legacy</tt></td>
          </tr>
          <tr>
            <td align="left">0x0620</td>
            <td align="left">
              <tt>rsa_pkcs1_sha512_legacy</tt></td>
          </tr>
        </tbody>
      </table>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="X690">
          <front>
            <title>Information technology - ASN.1 encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)</title>
            <author>
              <organization>ITU-T</organization>
            </author>
            <date year="2002"/>
          </front>
          <seriesInfo name="ISO/IEC" value="8825-1:2002"/>
        </reference>
        <reference anchor="TPM12" target="https://trustedcomputinggroup.org/wp-content/uploads/TPM-Main-Part-2-TPM-Structures_v1.2_rev116_01032011.pdf">
          <front>
            <title>TPM Main Specification Level 2 Version 1.2, Revision 116, Part 2 - Structures of the TPM</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2011" month="March" day="01"/>
          </front>
        </reference>
        <reference anchor="TPM2" target="https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf">
          <front>
            <title>Trusted Platform Module Library Specification, Family 2.0, Level 00, Revision 01.59, Part 1: Architecture</title>
            <author>
              <organization>Trusted Computing Group</organization>
            </author>
            <date year="2019" month="November" day="08"/>
          </front>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="SHS">
          <front>
            <title>Secure Hash Standard</title>
            <author fullname="Quynh H. Dang" initials="Q." surname="Dang">
              <organization/>
            </author>
            <date month="July" year="2015"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.fips.180-4"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="MFSA201473" target="https://www.mozilla.org/en-US/security/advisories/mfsa2014-73/">
          <front>
            <title>RSA Signature Forgery in NSS</title>
            <author initials="A." surname="Delignat-Lavaud" fullname="Antoine Delignat-Lavaud">
              <organization/>
            </author>
            <date year="2014" month="September" day="23"/>
          </front>
        </reference>
        <reference anchor="POODLE" target="https://security.googleblog.com/2014/10/this-poodle-bites-exploiting-ssl-30.html">
          <front>
            <title>This POODLE bites: exploiting the SSL 3.0 fallback</title>
            <author initials="B." surname="Moeller" fullname="Bodo Moeller">
              <organization/>
            </author>
            <date year="2014" month="October" day="14"/>
          </front>
        </reference>
        <reference anchor="PRIVACY">
          <front>
            <title>Push away your privacy: Precise user tracking based on TLS client certificate authentication</title>
            <author fullname="Matthias Wachs" initials="M." surname="Wachs">
              <organization/>
            </author>
            <author fullname="Quirin Scheitle" initials="Q." surname="Scheitle">
              <organization/>
            </author>
            <author fullname="Georg Carle" initials="G." surname="Carle">
              <organization/>
            </author>
            <date month="June" year="2017"/>
          </front>
          <seriesInfo name="2017 Network Traffic Measurement and Analysis Conference" value="(TMA)"/>
          <seriesInfo name="DOI" value="10.23919/tma.2017.8002897"/>
          <refcontent>IEEE</refcontent>
        </reference>
        <reference anchor="I-D.ietf-tls-hybrid-design">
          <front>
            <title>Hybrid key exchange in TLS 1.3</title>
            <author fullname="Douglas Stebila" initials="D." surname="Stebila">
              <organization>University of Waterloo</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Shay Gueron" initials="S." surname="Gueron">
              <organization>University of Haifa</organization>
            </author>
            <date day="7" month="September" year="2023"/>
            <abstract>
              <t>   Hybrid key exchange refers to using multiple key exchange algorithms
   simultaneously and combining the result with the goal of providing
   security even if all but one of the component algorithms is broken.
   It is motivated by transition to post-quantum cryptography.  This
   document provides a construction for hybrid key exchange in the
   Transport Layer Security (TLS) protocol version 1.3.

   Discussion of this work is encouraged to happen on the TLS IETF
   mailing list tls@ietf.org or on the GitHub repository which contains
   the draft: https://github.com/dstebila/draft-ietf-tls-hybrid-design.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-hybrid-design-09"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
