Hi,

I did a review of draft-ietf-jose-deprecate-none-rsa15-03

---

“that future algorithm registrations should meet”

“shold meet” does not seem to match the text in 4.2 that says:

“only algorithms that are believed to meet … should be considered for approval”

Suggestion to change to “are required to meet” that would match the text in 4.2.
According to 4.2 algorithms not meeting the requirement will not even be 
considered.

---

“should be registered in future.”

See comment above

---

“NIST has disallowed the use of this encryption mode for federal use since the 
end of 2023  [NIST.SP800-131Ar2] and a CFRG draft [I-D.irtf-cfrg-rsa-guidance] 
also deprecates this encryption mode for IETF protocols.”

Should add that PKCS#1: RFC 8017, RFC 3447, and RFC 2437 (1998) states that 
“RSAES-PKCS1-v1_5 is included only for compatibility with existing 
applications.”, i.e., don’t use it in any new applications. That a completely 
new application like JOSE (2015) took this PKCS#1 algorithm that PKCS#1 
deprecated in 1998 and made it “Recommended” sent the message that IETF is not 
prioritizing security. Good that this is fixed.

---

“only algorithms that are believed to meet the standard security goal of 
existential unforgeability under a chosen message attack (EUF-CMA) should be 
considered for approval”

With my chair hat off, I think this should be changed to strong existential 
unforgeability under a chosen message attack (SUF-CMA). EdDSA, ML-DSA, and 
SLH-DSA are SUF-CMA (for very good reasons). EUF-CMA can lead to significant 
vulnerabilities such as replay of messages, double billing, double money 
transactions, double receipts, double contracts, and log/transaction history 
poisoning. SUF-CMA vs EUF-CMA is not a theoretic consideration; it is very much 
a real-world problem. JOSE is used in a wide variety of use cases. And we know 
that many/most developers will assume that all signatures are SUF-CMA.

While JOSE has some EUF-CMA only signatures registered, I do not think we 
should register any more.

----

Cheers,
John Preuß Mattsson

On 2025-09-19, 11:09, "[email protected]" <[email protected]> 
wrote:
Internet-Draft draft-ietf-jose-deprecate-none-rsa15-03.txt is now available.
It is a work item of the Javascript Object Signing and Encryption (JOSE) WG of
the IETF.

   Title:   JOSE: Deprecate 'none' and 'RSA1_5'
   Author:  Neil Madden
   Name:    draft-ietf-jose-deprecate-none-rsa15-03.txt
   Pages:   7
   Dates:   2025-09-19

Abstract:

   This document updates [RFC7518] to deprecate the JWS algorithm "none"
   and the JWE algorithm "RSA1_5".  These algorithms have known security
   weaknesses.  It also updates the Review Instructions for Designated
   Experts to establish baseline security requirements that future
   algorithm registrations should meet.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-jose-deprecate-none-rsa15/

There is also an HTML version available at:
https://www.ietf.org/archive/id/draft-ietf-jose-deprecate-none-rsa15-03.html

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-jose-deprecate-none-rsa15-03

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts



_______________________________________________
jose mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to