<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-sheffer-tls-pqc-continuity-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="PQC Continuity">PQC Continuity: Downgrade Protection for TLS Servers Migrating to PQC</title>
    <seriesInfo name="Internet-Draft" value="draft-sheffer-tls-pqc-continuity-00"/>
    <author fullname="Yaron Sheffer">
      <organization>Intuit</organization>
      <address>
        <email>yaronf.ietf@gmail.com</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <postal>
          <city>Bangalore</city>
          <region>Karnataka</region>
          <country>India</country>
        </postal>
        <email>k.tirumaleswar_reddy@nokia.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="19"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>PQC</keyword>
    <keyword>TLS</keyword>
    <keyword>Downgrade Attacks</keyword>
    <abstract>
      <?line 38?>

<t>As the Internet transitions toward post-quantum cryptography (PQC), many TLS servers will continue supporting
traditional certificates to maintain compatibility with legacy clients. However, this coexistence introduces a significant vulnerability: an undetected rollback attack, where a malicious actor strips the PQC or Composite certificate and forces the use of a traditional certificate once quantum-capable adversaries exist.</t>
      <t>To defend against this, this document defines a TLS extension that allows a client to cache a server's declared commitment to present PQC or composite certificates for a specified duration. On subsequent connections, clients enforce that cached commitment and reject traditional-only certificates that conflict with it. This mechanism, inspired by HTTP Strict Transport Security (HSTS) but operating at the TLS layer provides PQC downgrade protection without requiring changes to certificate authority (CA) infrastructure.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://yaronf.github.io/draft-sheffer-tls-pqc-continuity/draft-sheffer-tls-pqc-continuity.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-sheffer-tls-pqc-continuity/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/yaronf/draft-sheffer-tls-pqc-continuity"/>.</t>
    </note>
  </front>
  <middle>
    <?line 45?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The migration to post-quantum cryptography (PQC) will be gradual. Servers will
likely host both traditional and PQC (or composite) certificates to maintain
compatibility: legacy clients can still connect, while updated ones benefit
from PQC authentication. The size of the legacy client base often drives the
decision to keep traditional certificates. Relevant PQC work includes
<xref target="I-D.ietf-lamps-dilithium-certificates"/> (ML-DSA),
<xref target="I-D.ietf-lamps-x509-slhdsa"/> (SLH-DSA), and
<xref target="I-D.ietf-lamps-pq-composite-sigs"/> (composites).  Not only must legacy
clients be supported by servers for years, new clients that support PQC are
also incented to accept traditional certificates, to retain connectivity to
legacy servers.</t>
      <t>Once a cryptographically relevant quantum computer (CRQC) emerges publicly,
traditional certificates become insecure
and must be revoked, regardless of legacy disruption. However, a CRQC may remain undisclosed, allowing
attackers to exploit classical algorithms secretly. In such cases, adversaries could strip PQC or composite
certificates, present only traditional ones, and conduct MitM attacks. Relying parties therefore need
mechanisms to detect when servers claiming PQC support revert to traditional credentials only.</t>
      <t>To prevent such downgrade attacks, this document defines a TLS extension that enables the
TLS client to cache an indication that the server is able to
present a (Composite or pure) PQ certificate, for some duration of time, e.g. one year. As a result:</t>
      <ul spacing="normal">
        <li>
          <t>Clients reconnecting to an already known server within the validity period are protected
from rollback to classic certificates.</t>
        </li>
        <li>
          <t>A client begins enforcing the server's PQC commitment only after it has
successfully connected to the legitimate server at least once (i.e., a connection
not intercepted by a MiTM). Earlier connections that are
intercepted or downgraded do not prevent the client from gaining protection
once it later observes a PQC commitment from a legitimate server.</t>
        </li>
      </ul>
      <t>The explicitly communicated caching time allows clients to implement a caching policy with no risk of sudden
breakage, and allows servers to revert to traditional certificates if they ever see the need to do so.</t>
      <t>This extension is modeled on HSTS <xref target="RFC6797"/>, but whereas HSTS is at the HTTP layer, the extension
is implemented at the TLS layer.</t>
      <t>On the open Web, we expect this extension to be used mainly for caching the fact that a server is
presenting a PQC or composite certificate. However, in other use cases such as service-to-service traffic,
it would often make sense to use it for both clients and servers.</t>
      <t>An alternative approach to downgrade attacks, described in <xref target="I-D.reddy-lamps-x509-pq-commit"/>,
uses specially marked certificates to denote the server's long-term commitment
to use PQC algorithms. See <xref target="solution-comparison"/> for a comparison between the two approaches.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="the-pqcertavailable-extension">
      <name>The pq_cert_available Extension</name>
      <t>The following section defines a TLS extension that describes a TLS peer's commitment to present PQC
credentials.</t>
      <section anchor="extension-definition">
        <name>Extension Definition</name>
        <t>This is a TLS extension, as per sec. 4.2 of <xref target="RFC8446"/>. The extension type for <tt>pq_cert_available</tt> is TBD by IANA.
It <bcp14>MAY</bcp14> appear in the ClientHello (CH) message, CertificateRequest (CR) message and in Certificate (CT) messages sent by either client or server.</t>
        <t>A supporting client <bcp14>MUST</bcp14> include this extension in its ClientHello message, with no extension data.</t>
        <t>If the client indicates support, the server <bcp14>MAY</bcp14> include the extension in its Certificate message.
For symmetry, the server <bcp14>MAY</bcp14> also send an empty <tt>pq_cert_available</tt> extension
in the CertificateRequest to indicate support for this mechanism.
A client <bcp14>MUST NOT</bcp14> include pq_cert_available in its Certificate message unless the server has first included the extension in a CertificateRequest message.</t>
        <t>The extension data when sent in the Certificate message is:</t>
        <artwork><![CDATA[
struct {
    SignatureScheme signature_algorithm;
    uint32 algorithm_validity_period;
}
]]></artwork>
        <t>This extension follows the format of TLS 1.3 Certificate message extensions as defined in Sec. 4.4.2 of <xref target="RFC8446"/>.</t>
        <t>Note on terminology: Since the extension may be used by either client or server, the term "sender" is used for the peer that sent the
extension in its Certificate message and "recipient" for the other peer.</t>
        <t>The <tt>signature_algorithm</tt> in this extension <bcp14>MUST</bcp14> be the signature algorithm
that the sender's end-entity certificate is associated with. <tt>SignatureScheme</tt> is defined by
<xref target="RFC8446"/>.</t>
        <t>The <tt>algorithm_validity_period</tt> field is the time duration, in seconds, that the
sender commits to continue to present a certificate that enables this
signature scheme. The time duration is measured starting with the TLS handshake
and is unrelated to any particular certificate or its lifecycle. A value of zero
indicates no post-handshake commitment.</t>
      </section>
      <section anchor="algorithm-selection">
        <name>Algorithm Selection</name>
        <t>If one of the peers holds unexpired cached information for the other peer:</t>
        <ul spacing="normal">
          <li>
            <t>The peer <bcp14>SHOULD</bcp14> include the cached algorithm in the <tt>signature_algorithms</tt> extension of its
ClientHello (or CertificateRequest for servers),
and <bcp14>MUST NOT</bcp14> include legacy (non-PQC) algorithms.</t>
          </li>
          <li>
            <t>It <bcp14>MAY</bcp14> include other PQ signature algorithms, according to local policy.</t>
          </li>
        </ul>
        <t>As a result, the handshake would fail if a rollback attack is attempted.</t>
      </section>
      <section anchor="recipient-behavior">
        <name>Recipient Behavior</name>
        <t>A recipient that supports this extension <bcp14>MUST</bcp14> behave as follows:</t>
        <ol spacing="normal" type="1"><li>
            <t>If the recipient holds no cached information for the sender, and the sender includes a
non-empty extension:  </t>
            <ul spacing="normal">
              <li>
                <t>The recipient <bcp14>SHOULD</bcp14> cache the provided information after the handshake is
completed successfully and after the extension's data has been validated.</t>
              </li>
              <li>
                <t>The recipient <bcp14>MAY</bcp14> choose to cache the signature algorithm for a shorter period than specified.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the recipient holds unexpired cached information for the sender, and receives a returned extension from the sender:  </t>
            <ul spacing="normal">
              <li>
                <t>The recipient should validate the <tt>signature_algorithm</tt> relative to the
certificate being presented and <bcp14>SHOULD</bcp14> extend its cache period if the
received time value would expire later than its current cache expiry.</t>
              </li>
              <li>
                <t>It <bcp14>SHOULD NOT</bcp14> accept an <tt>algorithm_validity</tt> value if it would decrease
its existing value (within a few seconds' tolerance).</t>
              </li>
              <li>
                <t>It <bcp14>SHOULD</bcp14> replace its cached signature algorithm for the sender by a
different PQ algorithm if such is sent in the extension, and in this case,
it <bcp14>SHOULD</bcp14> use the validity time as-is.</t>
              </li>
            </ul>
          </li>
          <li>
            <t>If the recipient holds unexpired cached information for the sender, and
receives no returned extension from the sender, the recipient <bcp14>SHOULD NOT</bcp14>
modify its cache.</t>
          </li>
        </ol>
        <t><cref>OPEN ISSUE: do we discuss how the cache is indexed? Service identity per RFC 9525?</cref></t>
      </section>
      <section anchor="sender-behavior">
        <name>Sender Behavior</name>
        <ol spacing="normal" type="1"><li>
            <t>A TLS client or server that receives an indication that its peer supports this
extension <bcp14>SHOULD</bcp14> send this extension in the Certificate message, provided a
PQ signature algorithm is used.</t>
          </li>
          <li>
            <t>The sender <bcp14>MUST</bcp14> keep track of the time duration it has committed to, and use
a PQ certificate to authenticate itself for that entire duration. The sender
<bcp14>MAY</bcp14> change its certificates and may switch between PQ signature algorithms at
will, provided the peer indicates acceptance of these algorithms.</t>
          </li>
        </ol>
        <t>This obligation is analogous to maintaining HSTS continuity: once a commitment is made,
the sender <bcp14>MUST</bcp14> avoid reverting to classical certificates until expiry of <tt>algorithm_validity</tt>.</t>
      </section>
      <section anchor="operational-considerations">
        <name>Operational Considerations</name>
        <t>This extension establishes a (potentially) long-term commitment of the sender
to support PQ signature algorithms. As such, we recommend that deployers first
experiment with short validity periods (e.g. one day), and only when satisfied
that peers populate and depopulate their cache correctly, they can move to a longer
duration. In the case of HSTS, lifetimes are commonly set to one year.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>IANA is requested to assign a new value from the “TLS ExtensionType Values”</t>
      <table>
        <thead>
          <tr>
            <th align="right">Value</th>
            <th align="left">Extension Name</th>
            <th align="center">TLS 1.3</th>
            <th align="center">Recommended</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="right">TBD</td>
            <td align="left">pq_cert_available</td>
            <td align="center">CH, CR,CT</td>
            <td align="center">Y</td>
            <td align="left">This document</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="document-history">
      <name>Document History</name>
      <t>RFC Editor: please remove before publication.</t>
      <section anchor="draft-sheffer-tls-pqc-continuity-00">
        <name>draft-sheffer-tls-pqc-continuity-00</name>
        <t>Initial version.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-lamps-dilithium-certificates">
          <front>
            <title>Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Digital Signature Algorithm (ML-DSA)</title>
            <author fullname="Jake Massimo" initials="J." surname="Massimo">
              <organization>AWS</organization>
            </author>
            <author fullname="Panos Kampanakis" initials="P." surname="Kampanakis">
              <organization>AWS</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="30" month="September" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 certificates, Certificate
   Revocation Lists (CRLs), and to sign messages.  This document
   specifies the conventions for using FIPS 204, the Module-Lattice-
   Based Digital Signature Algorithm (ML-DSA) in Internet X.509
   certificates and certificate revocation lists.  The conventions for
   the associated signatures, subject public keys, and private key are
   also described.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-dilithium-certificates-13"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-x509-slhdsa">
          <front>
            <title>Internet X.509 Public Key Infrastructure: Algorithm Identifiers for SLH-DSA</title>
            <author fullname="Kaveh Bashiri" initials="K." surname="Bashiri">
              <organization>BSI</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <author fullname="Stefan-Lukas Gazdag" initials="S." surname="Gazdag">
              <organization>genua GmbH</organization>
            </author>
            <author fullname="Daniel Van Geest" initials="D." surname="Van Geest">
              <organization>CryptoNext Security</organization>
            </author>
            <author fullname="Stavros Kousidis" initials="S." surname="Kousidis">
              <organization>BSI</organization>
            </author>
            <date day="30" month="June" year="2025"/>
            <abstract>
              <t>   Digital signatures are used within X.509 Public Key Infrastructure
   such as X.509 certificates, Certificate Revocation Lists (CRLs), and
   to sign messages.  This document specifies the conventions for using
   the Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) in
   X.509 Public Key Infrastructure.  The conventions for the associated
   signatures, subject public keys, and private keys are also specified.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-x509-slhdsa-09"/>
        </reference>
        <reference anchor="I-D.ietf-lamps-pq-composite-sigs">
          <front>
            <title>Composite ML-DSA for use in X.509 Public Key Infrastructure</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Massimiliano Pala" initials="M." surname="Pala">
              <organization>OpenCA Labs</organization>
            </author>
            <author fullname="Jan Klaußner" initials="J." surname="Klaußner">
              <organization>Bundesdruckerei GmbH</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   This document defines combinations of ML-DSA [FIPS.204] in hybrid
   with traditional algorithms RSASSA-PKCS1-v1.5, RSASSA-PSS, ECDSA,
   Ed25519, and Ed448.  These combinations are tailored to meet
   regulatory guidelines.  Composite ML-DSA is applicable in
   applications that uses X.509 or PKIX data structures that accept ML-
   DSA, but where the operator wants extra protection against breaks or
   catastrophic bugs in ML-DSA, and where EUF-CMA-level security is
   acceptable.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-lamps-pq-composite-sigs-12"/>
        </reference>
        <reference anchor="RFC6797">
          <front>
            <title>HTTP Strict Transport Security (HSTS)</title>
            <author fullname="J. Hodges" initials="J." surname="Hodges"/>
            <author fullname="C. Jackson" initials="C." surname="Jackson"/>
            <author fullname="A. Barth" initials="A." surname="Barth"/>
            <date month="November" year="2012"/>
            <abstract>
              <t>This specification defines a mechanism enabling web sites to declare themselves accessible only via secure connections and/or for users to be able to direct their user agent(s) to interact with given sites only over secure connections. This overall policy is referred to as HTTP Strict Transport Security (HSTS). The policy is declared by web sites via the Strict-Transport-Security HTTP response header field and/or by other means, such as user agent configuration, for example. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6797"/>
          <seriesInfo name="DOI" value="10.17487/RFC6797"/>
        </reference>
        <reference anchor="I-D.reddy-lamps-x509-pq-commit">
          <front>
            <title>X.509 Extensions for PQC or Composite Certificate Hosting Continuity</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Yaron Sheffer" initials="Y." surname="Sheffer">
              <organization>Intuit</organization>
            </author>
            <date day="12" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies a new X.509 certificate extension, Post-
   Quantum or Composite Hosting Continuity (PQCHC), which enables a
   certificate subject to signal a intent to continue serving PQC or
   composite certificates for a defined continuity period after
   certificate expiration.  This extension helps relying parties detect
   downgrade and man-in-the-middle (MitM) attacks during transition
   phases, where a cryptographically relevant quantum computer (CRQC)
   would make traditional certificates insecure.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-lamps-x509-pq-commit-00"/>
        </reference>
      </references>
    </references>
    <?line 246?>

<section anchor="solution-comparison">
      <name>Comparison with the Certificate-Based Solution</name>
      <t>This section is a comparison with an analogous solution <xref target="I-D.reddy-lamps-x509-pq-commit"/> for the same rollback
problem, one that signals server continuity using certificates rather than the TLS connection itself.</t>
      <ul spacing="normal">
        <li>
          <t>The certificate-based solution does not change the TLS handshake, which potentially makes adoption easier. However, changes
to the Web Public Key Infrastructure would also affect adoption.</t>
        </li>
        <li>
          <t>The certificate-based solution is independent of TLS and thus can be used by other protocols.</t>
        </li>
        <li>
          <t>Operationally, it may be harder to manage the “commitment” through certificates vs. TLS configuration.
For example, in the HSTS space, it is common to experiment first with very short durations, e.g. 1 day,
before moving to a longer commitment. This could have a significant effect on real-life adoption.</t>
        </li>
        <li>
          <t>The revocation checking aspect of the certificate-based solution relies upon other mechanisms
(e.g. CRLs, OCSP) to also be signed with PQC/Composite. Those other RFCs and
implementations are likely to take even longer to materialize.</t>
        </li>
      </ul>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
