<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.2.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-hardaker-dnsop-must-not-ecc-gost-00" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with ECC-GOST">Remove ECC-GOST from active use within DNSSEC</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2024" month="February" day="27"/>

    
    
    

    <abstract>


<?line 47?>

<t>This document retires the use of ECC-GOST within DNSSEC.</t>



    </abstract>



  </front>

  <middle>


<?line 51?>

<section anchor="introduction"><name>Introduction</name>

<t>The security of the ECC-GOST algorithm <xref target="RFC5933"/> has been slowly
diminishing over time as various forms of attacks have weakened its
cryptographic underpinning.  Thus, the use of ECC-GOST is no longer
needed and is not recommend for use in DNSSEC <xref target="RFC4033"/> <xref target="RFC4034"/>
<xref target="RFC4035"/>.</t>

<t>This document retires the use of ECC-GOST within DNSSEC.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-ecc-gost-algorithms-in-dnssec"><name>Deprecating ECC-GOST algorithms in DNSSEC</name>

<t>The ECC-GOST <xref target="RFC5933"/> algorithm MUST NOT be used when creating DS
records.  Validating resolvers MUST treat DS records as insecure.  If
no other DS records of accepted cryptographic algorithms are
available, the DNS records below the delegation point MUST be treated
as insecure.</t>

<t>The ECC-GOST <xref target="RFC5933"/> algorithm MUST NOT be used when creating
DNSKEY and RRSIG records.  Validating resolvers MUST treat RRSIG
records created from DNSKEY records using these algorithms as
insecure.  If no other RRSIG records of accepted cryptographic
algorithms are available, the validating resolver MUST consider the
associated resource records as Bogus.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document increases the security of the DNSSEC ecosystem by
deprecating algorithms that make use of older algorithms with ECC-GOST
derived uses.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>Zone owners currently making use of ECC-GOST based algorithms should
immediate switch to algorithms with stronger cryptographic strengths,
such as those listed in the introduction.  DNS registries <xref target="RFC8499"/>
should prohibit their clients to upload and publish ECC-GOST based DS
records.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to set the "DNSSEC Validation" of the "Digest
Algorithms" registry <xref target="DS-IANA"/> for ECC-GOST (3) to MUST NOT.</t>

<t>IANA is requested to set the "Recommended for DNSSEC Validation"
column of the DNS Security Algorithm Numbers registry <xref target="DNSKEY-IANA"/>
for ECC-GOST (23) to MUST NOT:</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC4033">
  <front>
    <title>DNS Security Introduction and Requirements</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4033"/>
  <seriesInfo name="DOI" value="10.17487/RFC4033"/>
</reference>

<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>

<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>

<reference anchor="RFC5933">
  <front>
    <title>Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <author fullname="A. Chuprina" initials="A." surname="Chuprina"/>
    <author fullname="I. Ustinov" initials="I." surname="Ustinov"/>
    <date month="July" year="2010"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2001 and GOST R 34.11-94 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5933"/>
  <seriesInfo name="DOI" value="10.17487/RFC5933"/>
</reference>

<reference anchor="RFC8080">
  <front>
    <title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
    <author fullname="O. Sury" initials="O." surname="Sury"/>
    <author fullname="R. Edmonds" initials="R." surname="Edmonds"/>
    <date month="February" year="2017"/>
    <abstract>
      <t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC). It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8080"/>
  <seriesInfo name="DOI" value="10.17487/RFC8080"/>
</reference>


<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC8499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="January" year="2019"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="219"/>
  <seriesInfo name="RFC" value="8499"/>
  <seriesInfo name="DOI" value="10.17487/RFC8499"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>


<?line 110?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>TBD</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>[RFC Editor: please delete this section upon publication]</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-sha1</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

