One may note that no matter what the choice is with respect to RSA, this
particular wrinkle also applies more broadly. For example, if a client
advertises support for ed25519 in "signature_algorithms" in order to
support ed25519 delegated credentials, it should also be prepared to
receive an ed25519 certificate.

Nick

On Tue, Oct 15, 2019 at 5:00 PM Martin Thomson <m...@lowentropy.net> wrote:

> I think that what Nick proposes is consistent with this, and it also
> matches my preference.  Requiring a PSS OID is nice in that it creates a
> strong constraint.
>
> However, there is a wrinkle.  The way you signal support for the signature
> scheme is through the signature_algorithms extension.  If you advertise
> rsa_pss_pss_*, then that means that you are also indicating support for an
> end entity certificate with a PSS SPKI.  Some certificate validation
> software hasn't been updated to support that and might choke if they got a
> PSS SPKI in a certificate.
>
> I don't know if we could support RSA without double checking our code.
> Adding support shouldn't be too hard, and we don't current advertise PSS
> support, so it's not a complete deal breaker for us, but it's worth
> highlighting.
>
> On Tue, Oct 15, 2019, at 15:58, Russ Housley wrote:
> > When we were working on RFC 4055, we thought it would be important to
> > allow a certified RSA public key to be bound to a specific algorithm
> > (e.g., RSA-PSS or RSA-OAEP). However, in transition, we thought it
> > would be important for the certified RSA public key to be used with any
> > of the algorithms (constrained by key usage extension).
> >
> > Section 1.2 says:
> >
> >  The rsaEncryption object identifier continues to identify the subject
> >  public key when the RSA private key owner does not wish to limit the
> >  use of the public key exclusively to either RSASSA-PSS or RSAES-OAEP.
> >
> >  ...
> >
> >  When the RSA private key owner wishes to limit the use of the public
> >  key exclusively to RSASSA-PSS, then the id-RSASSA-PSS object
> >  identifier MUST be used in the algorithm field within the subject
> >  public key information ...
> >
> >  When the RSA private key owner wishes to limit the use of the public
> >  key exclusively to RSAES-OAEP, then the id-RSAES-OAEP object
> >  identifier MUST be used in the algorithm field within the subject
> >  public key information ...
> >
> > I would like to continue with the approach.
> >
> > Russ
> >
> >
> > > On Oct 15, 2019, at 6:34 PM, Nick Sullivan <nick=
> 40cloudflare....@dmarc.ietf.org> wrote:
> > >
> > > TLSWG,
> > >
> > > I'd like some feedback on a potential issue raised by Martin Thomson
> at the last IETF. The question is about the interaction between the SPKI
> and the signature scheme for RSA delegated credentials. The main concern is
> around the interaction between the rsaEncryption OID and the signature
> scheme, specifically PKCS#1v1.5, which we disallow in TLS 1.3 but not
> explicitly in DCs (yet). This issue is tracked on Github as issues/28 <
> https://github.com/tlswg/tls-subcerts/issues/28>.
> > >
> > > Given the feedback on Github, I see two main choices to resolve this
> issue:
> > >
> > > 1) Allow RSA Credentials with the rsaEncryption OID in the SPKI to be
> used with the rsa_pss_rsae_* signature schemes, but disallow rsa_pkcs1_*
> signature schemes.
> > > 2) Forbid RSA Credentials with the rsaEncryption OID (and associated
> signature schemes) and require an RSA PSS OIDs for rsa_pss_pss_* signature
> schemes.
> > >
> > > Does anyone have a strong preference for one of these options?
> > >
> > > My take:
> > > The rsa_pss_rsae_* suites are a hack created to allow TLS 1.3 to be
> backward-compatible with existing rsaEncryption OID certs while enabling
> RSA-PSS. We don't have this legacy in delegated credentials, so I'm
> inclined to prefer 2).
> > >
> > > The only reason I see to go for 1) is the risk of implementation
> difficulties. The RSA PSS OIDs are hard to get right in code. However,
> considering that RSA DCs are unlikely to be widely used in favor of
> elliptic-curve DCs, the implementation risk seems low and restricted to
> implementations who choose to support RSA DCs as an optional feature.
> > >
> > > Nick
> > >
> > >  _______________________________________________
> > > TLS mailing list
> > > TLS@ietf.org
> > > https://www.ietf.org/mailman/listinfo/tls
> >
> > _______________________________________________
> > TLS mailing list
> > TLS@ietf.org
> > https://www.ietf.org/mailman/listinfo/tls
> >
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to