Thanks John! Comments below. 

> On 3 Oct 2025, at 08:48, John Mattsson 
> <[email protected]> wrote:
> 
> 
> Hi,
>  
> I did a review of draft-ietf-jose-deprecate-none-rsa15-03
>  
> ---
>  
> “that future algorithm registrations should meet”
>  
> “shold meet” does not seem to match the text in 4.2 that says:
>  
> “only algorithms that are believed to meet … should be considered for 
> approval”
>  
> Suggestion to change to “are required to meet” that would match the text in 
> 4.2.
> According to 4.2 algorithms not meeting the requirement will not even be 
> considered.

Agreed, will update. 
>  
> ---
>  
> “should be registered in future.”
>  
> See comment above

+1. 

>  
> ---
>  
> “NIST has disallowed the use of this encryption mode for federal use since 
> the end of 2023  [NIST.SP800-131Ar2] and a CFRG draft 
> [I-D.irtf-cfrg-rsa-guidance] also deprecates this encryption mode for IETF 
> protocols.”
>  
> Should add that PKCS#1: RFC 8017, RFC 3447, and RFC 2437 (1998) states that 
> “RSAES-PKCS1-v1_5 is included only for compatibility with existing 
> applications.”, i.e., don’t use it in any new applications. That a completely 
> new application like JOSE (2015) took this PKCS#1 algorithm that PKCS#1 
> deprecated in 1998 and made it “Recommended” sent the message that IETF is 
> not prioritizing security. Good that this is fixed.

Good point. I will add some wording to this effect. 

>  
> ---
>  
> “only algorithms that are believed to meet the standard security goal of 
> existential unforgeability under a chosen message attack (EUF-CMA) should be 
> considered for approval”
>  
> With my chair hat off, I think this should be changed to strong existential 
> unforgeability under a chosen message attack (SUF-CMA). EdDSA, ML-DSA, and 
> SLH-DSA are SUF-CMA (for very good reasons). EUF-CMA can lead to significant 
> vulnerabilities such as replay of messages, double billing, double money 
> transactions, double receipts, double contracts, and log/transaction history 
> poisoning. SUF-CMA vs EUF-CMA is not a theoretic consideration; it is very 
> much a real-world problem. JOSE is used in a wide variety of use cases. And 
> we know that many/most developers will assume that all signatures are SUF-CMA.
>  
> While JOSE has some EUF-CMA only signatures registered, I do not think we 
> should register any more.
> 

From the other thread on this list, it seems that NIST is standardising some PQ 
signature schemes that are only EUF-CMA, so I’m not sure we can commit to 
SUF-CMA as an absolute requirement. I agree that SUF-CMA is a better bar for 
cryptographers to aim for, but I don’t want to potentially exclude useful 
algorithms. In the context of JOSE specifically, EUF-CMA seems sufficient? 
I.e., my view is that pushing for SUF-CMA is something for CFRG and NIST, 
upstream of IETF WGs like JOSE. 

(Also, re EdDSA - I thought some of the double-spend issues were using Ed25519?)

Best wishes,

Neil
_______________________________________________
jose mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to