rfc9963v1.txt   rfc9963.txt 
skipping to change at line 49 skipping to change at line 49
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Revised BSD License text as described in Section 4.e of the include Revised BSD License text as described in Section 4.e of the
Trust Legal Provisions and are provided without warranty as described Trust Legal Provisions and are provided without warranty as described
in the Revised BSD License. in the Revised BSD License.
Table of Contents Table of Contents
1. Introduction 1. Introduction
2. Conventions and Definitions 2. Conventions and Definitions
3. PKCS#1 v1.5 SignatureScheme Types 3. PKCS #1 v1.5 SignatureScheme Types
4. Security Considerations 4. Security Considerations
5. IANA Considerations 5. IANA Considerations
6. References 6. References
6.1. Normative References 6.1. Normative References
6.2. Informative References 6.2. Informative References
Acknowledgements Acknowledgements
Authors' Addresses Authors' Addresses
1. Introduction 1. Introduction
skipping to change at line 111 skipping to change at line 111
unblocks TLS 1.3 deployment. unblocks TLS 1.3 deployment.
2. Conventions and Definitions 2. Conventions and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in "OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here. capitals, as shown here.
3. PKCS#1 v1.5 SignatureScheme Types 3. PKCS #1 v1.5 SignatureScheme Types
The following SignatureScheme values are defined for use with TLS The following SignatureScheme values are defined for use with TLS
1.3. 1.3.
enum { enum {
rsa_pkcs1_sha256_legacy(0x0420), rsa_pkcs1_sha256_legacy(0x0420),
rsa_pkcs1_sha384_legacy(0x0520), rsa_pkcs1_sha384_legacy(0x0520),
rsa_pkcs1_sha512_legacy(0x0620), rsa_pkcs1_sha512_legacy(0x0620),
} SignatureScheme; } SignatureScheme;
skipping to change at line 143 skipping to change at line 143
Servers that wish to support clients authenticating with legacy Servers that wish to support clients authenticating with legacy
RSASSA-PKCS1-v1_5-only keys MAY send these values in the RSASSA-PKCS1-v1_5-only keys MAY send these values in the
signature_algorithms extension of the CertificateRequest message and signature_algorithms extension of the CertificateRequest message and
accept them in the client CertificateVerify message. Servers MUST accept them in the client CertificateVerify message. Servers MUST
NOT accept these code points if not offered in the CertificateRequest NOT accept these code points if not offered in the CertificateRequest
message. message.
Clients with such legacy keys MAY negotiate the use of these Clients with such legacy keys MAY negotiate the use of these
signature algorithms if offered by the server. Clients SHOULD NOT signature algorithms if offered by the server. Clients SHOULD NOT
negotiate them with keys that support RSASSA-PSS, though this may not negotiate the use of these signature algorithms with keys that
be practical to determine in all applications. For example, support RSASSA-PSS, though this may not be practical to determine in
attempting to test a key for support might display a message to the all applications. For example, attempting to test a key for support
user or have other side effects. might result in a message to the user or have other side effects.
TLS implementations SHOULD disable these code points by default. See TLS implementations SHOULD disable these code points by default. See
Section 4. Section 4.
4. Security Considerations 4. Security Considerations
The considerations in Section 1 do not apply to server keys, so these The considerations in Section 1 do not apply to server keys, so these
new code points are forbidden for use with server certificates. new code points are forbidden for use with server certificates.
RSASSA-PSS continues to be required for TLS 1.3 servers using RSA RSASSA-PSS continues to be required for TLS 1.3 servers using RSA
keys. This minimizes the impact to only those cases in which it is keys. This minimizes the impact to only those cases in which it is
 End of changes. 3 change blocks. 
6 lines changed or deleted 6 lines changed or added

This html diff was produced by rfcdiff 1.48.