<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-jose-deprecate-none-rsa15-04" category="std" consensus="true" submissionType="IETF" updates="7518" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>JOSE: Deprecate 'none' and 'RSA1_5'</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-jose-deprecate-none-rsa15-04"/>
    <author fullname="Neil Madden">
      <organization>Hazelcast</organization>
      <address>
        <email>neil.e.madden@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="March" day="02"/>
    <area>Security</area>
    <workgroup>Javascript Object Signing and Encryption</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 74?>

<t>This document updates <xref target="RFC7518"/> to deprecate the JWS algorithm "none" and the JWE algorithm
"RSA1_5". These algorithms have known security weaknesses. It also updates the Review
Instructions for Designated Experts to establish baseline security requirements that future
algorithm registrations should meet.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://NeilMadden.github.io/jose-deprecate-none-rsa1_5/draft-ietf-jose-deprecate-none-rsa15.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-jose-deprecate-none-rsa15/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Javascript Object Signing and Encryption Working Group mailing list (<eref target="mailto:jose@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/jose/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/jose/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/NeilMadden/jose-deprecate-none-rsa1_5"/>.</t>
    </note>
  </front>
  <middle>
    <?line 81?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>JSON Web Algorithms (JWA, <xref target="RFC7518"/>) introduced several standard algorithms for both JSON Web
Signature (JWS) and JSON Web Encryption (JWE). Many of these algorithms have stood the test of time
and are still in widespread use. However, some algorithms have proved to be difficult to implement
correctly leading to exploitable vulnerabilities. This document deprecates two such algorithms:</t>
      <ul spacing="normal">
        <li>
          <t>The JWS "none" algorithm, which indicates that no security is applied to the message at all.</t>
        </li>
        <li>
          <t>The JWE "RSA1_5" algorithm, which indicates RSA encryption with PKCS#1 version 1.5 padding.</t>
        </li>
      </ul>
      <t>Note that RSA signatures using PKCS#1 version 1.5 padding (<tt>RS256</tt>, <tt>RS384</tt>, and <tt>RS512</tt>) are
unchanged by this specification and can still be used.</t>
      <t>Additionally, this document also updates the Review Instructions for the JOSE Designated Experts,
to establish baseline security requirements for future JOSE algorithm registrations. Only algorithms
that are reasonably believed to satisfy these requirements should be registered in future.</t>
      <section anchor="the-none-algorithm">
        <name>The 'none' algorithm</name>
        <t>The "none" algorithm creates an Unsecured JWS, whose contents are completely unsecured as the name
implies. Despite strong guidance in the original RFC around not accepting Unsecured JWS by default,
many implementations have had serious bugs due to accepting this algorithm. In some cases, this has
led to a complete loss of security as authenticity and integrity checking can be disabled by an
adversary simply by changing the algorithm ("alg") header in the JWS. The website <xref target="howmanydays"/>
tracks public vulnerabilities due to implementations mistakenly accepting the "none" algorithm. It
currently lists 12 reports, many of which have high impact ratings. The following is a partial list
of issues known to have been caused by misuse of the "none" algorithm, with a Common Vulnerability
Enumeration <xref target="CVE"/> identifier, and a Common Vulnerability Scoring System <xref target="CVSS"/> score
indicating the severity of the impact:</t>
        <ul spacing="normal">
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2017-10862">CVE-2017-10862</eref> - CVSS: 5.3 (Medium)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2018-1000531">CVE-2018-1000531</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2020-15957">CVE-2020-15957</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-22160">CVE-2021-22160</eref> - CVSS: 9.8 (Critical)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29500">CVE-2021-29500</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29451">CVE-2021-29451</eref> - CVSS: 9.1 (Critical)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-29455">CVE-2021-29455</eref> - CVSS: 7.5 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2021-32631">CVE-2021-32631</eref> - CVSS: 6.5 (Medium)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2022-23540">CVE-2022-23540</eref> - CVSS: 7.6 (High)</t>
          </li>
          <li>
            <t><eref target="https://nvd.nist.gov/vuln/detail/CVE-2023-29357">CVE-2023-29357</eref> - CVSS: 9.8 (Critical)</t>
          </li>
        </ul>
        <t>Many other vulnerabilities have been reported without an accompanying CVE, which we do not list here.</t>
        <t>Although there are some historical use-cases for Unsecured JWS that are not security vulnerabilities,
these are relatively few in number and can easily be satisfied by alternative means. For example, two
of these are in OpenID Connect <xref target="OpenID.Core"/>: (1) securing unsigned ID Tokens via transmission over
TLS in Section 3.1.3.7 and (2) the use of unsigned request objects in Section 6.1.  The small risk of
breaking some of these use-cases is far outweighed by the improvement in security for the majority of
JWS users who may be impacted by accidental acceptance of the "none" algorithm.</t>
      </section>
      <section anchor="the-rsa15-algorithm">
        <name>The 'RSA1_5' algorithm</name>
        <t>The "RSA1_5" algorithm implements RSA encryption using PKCS#1 version 1.5 padding <xref target="RFC8017"/> (section 7.2). This
padding mode has long been known to have security issues, since at least Bleichenbacher's attack in
1998. It was supported in JWE due to the wide deployment of this algorithm, especially in legacy
hardware. However, more secure replacements such as OAEP <xref target="RFC8017"/> or elliptic curve encryption
algorithms are now widely available. NIST has disallowed the use of this encryption mode for federal
use since the end of 2023 <xref target="NIST.SP800-131Ar2"/> and a CFRG draft <xref target="I-D.irtf-cfrg-rsa-guidance"/> also deprecates
this encryption mode for IETF protocols. This document therefore also deprecates this algorithm for
JWE.</t>
      </section>
      <section anchor="guidance-on-deprecation">
        <name>Guidance on deprecation</name>
        <t>Both of the algorithms listed above are deprecated for use in JOSE—the <tt>none</tt> algorithm for JWS,
and <tt>RSA1_5</tt> for JWE. JOSE library developers should deprecate support for these algorithms. Application
developers <bcp14>MUST</bcp14> disable support for these algorithms by default. New specifications building on
top of JOSE <bcp14>MUST NOT</bcp14> allow the use of either algorithm.</t>
        <t>The IANA algorithm registry distinguishes between algorithms that are "Deprecated" and those that are
"Prohibited". The algorithms identified in this document are to be marked as Deprecated only. Existing
specifications and applictions that make use of these algorithms can continue to do so, but should
consider adopting alternatives in future updates.</t>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is concerned with security, since the security of JOSE implementations directly affects the security of systems that include them (see for example the long list of CVEs in Sec. 1.1).</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <section anchor="jose-algorithm-deprecations">
        <name>JOSE Algorithm Deprecations</name>
        <t>The following changes are to be made to the IANA JOSE Web Signature and Encryption Algorithms registry:</t>
        <ul spacing="normal">
          <li>
            <t>For the entry with Algorithm Name "none", update the JOSE Implementation Requirements to "Deprecated".</t>
          </li>
          <li>
            <t>For the entry with Algorithm Name "RSA1_5", update the JOSE Implementation Requirements to "Deprecated".</t>
          </li>
        </ul>
      </section>
      <section anchor="updated-review-instructions-for-designated-experts">
        <name>Updated Review Instructions for Designated Experts</name>
        <t>The review instructions for the designated experts for the IANA "JSON Web Signature and Encryption Algorithms"
registry <xref target="IANA.jose"/> in Section 7.1 of <xref target="RFC7518"/> are updated to add these additional review criteria:</t>
        <ul spacing="normal">
          <li>
            <t>For JWS signature algorithms, only algorithms that are believed to meet the standard security goal
of existential unforgeability under a chosen message attack (EUF-CMA) should be considered for approval. See textbooks such as <xref target="BonehShoup"/> (Section 13.1.1) for a definition of existential unforgeability.</t>
          </li>
          <li>
            <t>For JWE key management algorithms (specified with the "alg" header), only algorithms that are believed
to meet the standard security goal of indistinguishability under an adaptive chosen ciphertext
attack (IND-CCA2) should be considered for approval, as defined in textbooks such as <xref target="BonehShoup"/> (Section 9.2.2 and Chapter 12).</t>
          </li>
          <li>
            <t>For JWE content encryption methods (specified with the "enc" header), only algorithms that are believed
to meet the standard security goal of authenticated encryption with associated data (AEAD) should
be considered for approval. See <xref target="RFC5116"/>, and textbooks such as <xref target="BonehShoup"/> (Section 9.1), for the definition of AEAD security.</t>
          </li>
        </ul>
      </section>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7518">
          <front>
            <title>JSON Web Algorithms (JWA)</title>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <date month="May" year="2015"/>
            <abstract>
              <t>This specification registers cryptographic algorithms and identifiers to be used with the JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Key (JWK) specifications. It defines several IANA registries for these identifiers.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7518"/>
          <seriesInfo name="DOI" value="10.17487/RFC7518"/>
        </reference>
        <reference anchor="RFC5116">
          <front>
            <title>An Interface and Algorithms for Authenticated Encryption</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document defines algorithms for Authenticated Encryption with Associated Data (AEAD), and defines a uniform interface and a registry for such algorithms. The interface and registry can be used as an application-independent set of cryptoalgorithm suites. This approach provides advantages in efficiency and security, and promotes the reuse of crypto implementations. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5116"/>
          <seriesInfo name="DOI" value="10.17487/RFC5116"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="howmanydays" target="https://github.com/zofrex/howmanydayssinceajwtalgnonevuln/blob/deploy/data/vulns.yml">
          <front>
            <title>How Many Days Has It Been Since a JWT alg:none Vulnerability?</title>
            <author fullname="James Sanderson">
              <organization/>
            </author>
            <date year="2023" month="September" day="25"/>
          </front>
        </reference>
        <reference anchor="RFC8017">
          <front>
            <title>PKCS #1: RSA Cryptography Specifications Version 2.2</title>
            <author fullname="K. Moriarty" initials="K." role="editor" surname="Moriarty"/>
            <author fullname="B. Kaliski" initials="B." surname="Kaliski"/>
            <author fullname="J. Jonsson" initials="J." surname="Jonsson"/>
            <author fullname="A. Rusch" initials="A." surname="Rusch"/>
            <date month="November" year="2016"/>
            <abstract>
              <t>This document provides recommendations for the implementation of public-key cryptography based on the RSA algorithm, covering cryptographic primitives, encryption schemes, signature schemes with appendix, and ASN.1 syntax for representing keys and for identifying the schemes.</t>
              <t>This document represents a republication of PKCS #1 v2.2 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series. By publishing this RFC, change control is transferred to the IETF.</t>
              <t>This document also obsoletes RFC 3447.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8017"/>
          <seriesInfo name="DOI" value="10.17487/RFC8017"/>
        </reference>
        <reference anchor="I-D.irtf-cfrg-rsa-guidance">
          <front>
            <title>Implementation Guidance for the PKCS #1 RSA Cryptography Specification</title>
            <author fullname="Alicja Kario" initials="A." surname="Kario">
              <organization>Red Hat, Inc.</organization>
            </author>
            <date day="17" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies additions and amendments to RFC 8017.
   Specifically, it provides guidance to implementers of the standard to
   protect against side-channel attacks.  It also deprecates the RSAES-
   PKCS-v1_5 encryption scheme, but provides an alternative depadding
   algorithm that protects against side-channel attacks raising from
   users of vulnerable APIs.  The purpose of this specification is to
   increase security of RSA implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-rsa-guidance-06"/>
        </reference>
        <reference anchor="NIST.SP800-131Ar2">
          <front>
            <title>Transitioning the use of cryptographic algorithms and key lengths</title>
            <author fullname="Elaine Barker" initials="E." surname="Barker">
              <organization/>
            </author>
            <author fullname="Allen Roginsky" initials="A." surname="Roginsky">
              <organization/>
            </author>
            <date month="March" year="2019"/>
          </front>
          <seriesInfo name="DOI" value="10.6028/nist.sp.800-131ar2"/>
          <refcontent>National Institute of Standards and Technology</refcontent>
        </reference>
        <reference anchor="CVE" target="https://cve.mitre.org">
          <front>
            <title>Common Vulnerability Enumeration Database</title>
            <author>
              <organization>MITRE</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CVSS" target="https://www.first.org/cvss/">
          <front>
            <title>Common Vulnerability Scoring System</title>
            <author>
              <organization>FIRST</organization>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IANA.jose" target="https://www.iana.org/assignments/jose">
          <front>
            <title>JSON Object Signing and Encryption (JOSE)</title>
            <author>
              <organization>IANA</organization>
            </author>
          </front>
        </reference>
        <reference anchor="BonehShoup" target="https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_6.pdf">
          <front>
            <title>A Graduate Course in Applied Cryptography (v0.6)</title>
            <author fullname="Dan Boneh">
              <organization/>
            </author>
            <author fullname="Victor Shoup">
              <organization/>
            </author>
            <date year="2023" month="January" day="14"/>
          </front>
        </reference>
        <reference anchor="OpenID.Core" target="https://openid.net/specs/openid-connect-core-1_0.html">
          <front>
            <title>OpenID Connect Core 1.0 incorporating errata set 2</title>
            <author initials="N." surname="Sakimura">
              <organization/>
            </author>
            <author initials="J." surname="Bradley">
              <organization/>
            </author>
            <author initials="M." surname="Jones">
              <organization/>
            </author>
            <author initials="B." surname="de Medeiros">
              <organization/>
            </author>
            <author initials="C." surname="Mortimore">
              <organization/>
            </author>
            <date year="2023" month="December"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 205?>

<section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The author would like to thank the following people for feedback and useful suggestions:
Mike Ounsworth, Michael B. Jones, Yaron Sheffer, Brian Campbell, Aaron Parecki, Filip Skokan, Tim Bray,
and John Mattsson.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
