Some changes from the last time this was posted:
- Apparently we got early codepoint allocation for this and I forgot about
it? Anyway the allocated codepoints are now in the draft.
- We've crisped up the motivation a bit.

One thing I'll call out is that the previous discussion mentioned one could
stick with TLS 1.2. I think this was already not reasonable back then,
because TLS 1.3 fixes a serious privacy and integrity issue with client
certificates. (Renegotiation is not a good mitigation. There are loads of
problems with renegotiation, which I think this WG is very familiar with,
including incompatibility with modern multiplexed protocols.) But, more
importantly, new security improvements like post-quantum KEMs to protect
against store-and-decrypt-later attacks (rightfully) require TLS 1.3.

Additionally I want to emphasize that, because of the negotiation order
between versions and client certificates, there is no way to do an
incremental transition here. Saying deployments stick with 1.2 not only
impacts the relevant hardware but also *any other connections that the
server makes*. Essentially the server cannot enable TLS 1.3 until *every*
client has stopped using one of these PSS-incapable signers. This is not a
good transition plan.

It saddens me to have to allow RSASSA-PKCS1-v1_5 here, but I think, in the
limited scope that this draft covers (client certs only), this is clearly
the right move.

David

On Tue, Oct 24, 2023, 20:48 Andrei Popov <andrei.po...@microsoft.com> wrote:

> Hi TLS,
>
>
>
> We would like to re-introduce
> https://datatracker.ietf.org/doc/draft-davidben-tls13-pkcs1/
>
> (it’s intended for the TLS WG and the Standards track, despite what the
> document says at the top; we’ll fix it as soon as the submission tool
> reopens).
>
>
>
> In the course of TLS 1.3 deployment, it became apparent that a lot of
> hardware cryptographic devices used to protect TLS client certificate
> private keys cannot produce RSA-PSS signatures compatible with TLS.
>
> This draft would allow RSA-PKCS signatures in the client CertificateVerify
> messages (and not in any other contexts), as a way to unblock TLS 1.3
> deployments.
>
> This is an unfortunate situation, and work is being done with hardware
> vendors to reduce the likelihood of similar issues in the future, but
> existing devices tend to stay around for years.
>
>
>
> Comments/suggestions are welcome,
>
>
>
> Cheers,
>
>
>
> Andrei
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to