<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.5 (Ruby 3.2.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-must-not-ecc-gost-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with ECC-GOST">Remove deprecated GOST algorithms from active use within DNSSEC</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2024" month="October" day="03"/>

    
    
    

    <abstract>


<?line 46?>

<t>This document retires the use of ECC-GOST within DNSSEC.</t>



    </abstract>



  </front>

  <middle>


<?line 50?>

<section anchor="introduction"><name>Introduction</name>

<t>The use of the GOST R 34.10-2001 and GOST R 34.11-94 algorithms with
the DNS Security Extensions (DNSSEC) <xref target="RFC9364"></xref> was documented in
<xref target="RFC5933"/>. These two algorithms were deprecated by the Orders of the
Federal Agency for Technical Regulation and Metrology of Russia
(Rosstandart) in August 2012, and were superseded by GOST 34.10-2012
and GOST 34.11-2012 respectively. The use of GOST 34.10-2012 and GOST
34.11-2012 in DNSSEC is documented in <xref target="RFC9558"/>, and so <xref target="RFC5933"/>
has been made Historic.</t>

<t>Thus, the use of GOST R 34.10-2001 (mnemonic GOST-ECC) and and GOST R 34.11-94
is no longer recommended for use in DNSSEC <xref target="RFC9364"/>.</t>

<t>Note that this document does not change or discuss the use of GOST 34.10-2012
and GOST 34.11-2012.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-ecc-gost-algorithms-in-dnssec"><name>Deprecating ECC-GOST algorithms in DNSSEC</name>

<t>The GOST R 34.11-94 <xref target="RFC5933"/> algorithm MUST NOT be used when
creating DS records.  Validating resolvers MUST treat GOST R 34.11-94
DS records as insecure.  If no other DS records of accepted
cryptographic algorithms are available, the DNS records below the
delegation point MUST be treated as insecure.</t>

<t>The ECC-GOST <xref target="RFC5933"/> algorithm MUST NOT be used when creating
DNSKEY and RRSIG records.  Validating resolvers MUST treat
RRSIG records created from DNSKEY records using these algorithms as an
unsupported algorithm. If no other RRSIG records of accepted cryptographic
algorithms are available, the validating resolver MUST consider the
associated resource records as Insecure.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document increases the security of the DNSSEC ecosystem by
deprecating algorithms that make use of older algorithms with ECC-GOST
derived uses.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>Zone owners currently making use of ECC-GOST based algorithms should
immediate switch to algorithms with stronger cryptographic strengths.
DNS registries <xref target="RFC9499"/> should prohibit their clients to upload
and publish ECC-GOST based DS records.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to set the "Use for DNSSEC Signing", "Use for DNSSEC
Validation", "Implement for DNSSEC Signing", and "Implement for DNSSEC
Validation" columns of the DNS Security Algorithm Numbers registry
<xref target="DNSKEY-IANA"/> for ECC-GOST (23) to MUST NOT.  Note that previously
the "Use for DNSSEC Signing" and "Implement for DNSSEC Delegation"
columns were already MUST NOT.</t>

<t>IANA is requested to set the "Use for DNSSEC Delegation", "Use for DNSSEC
Validation", "Implement for DNSSEC Delegation", and "Implement for DNSSEC
Validation" columns of the "Digest Algorithms" registry <xref target="DS-IANA"/>
for GOST R 34.11-94 (3) to MUST NOT.  Note that previously
the "Use for DNSSEC Signing" and "Implement for DNSSEC Delegation"
columns were already MUST NOT.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC5933">
  <front>
    <title>Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <author fullname="A. Chuprina" initials="A." surname="Chuprina"/>
    <author fullname="I. Ustinov" initials="I." surname="Ustinov"/>
    <date month="July" year="2010"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2001 and GOST R 34.11-94 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5933"/>
  <seriesInfo name="DOI" value="10.17487/RFC5933"/>
</reference>

<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>


<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="March" year="2024"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document updates RFC 2308 by clarifying the definitions of "forwarder" and "QNAME". It obsoletes RFC 8499 by adding multiple terms and clarifications. Comprehensive lists of changed and new definitions can be found in Appendices A and B.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="219"/>
  <seriesInfo name="RFC" value="9499"/>
  <seriesInfo name="DOI" value="10.17487/RFC9499"/>
</reference>

<reference anchor="RFC9558">
  <front>
    <title>Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="B. Makarenko" initials="B." surname="Makarenko"/>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <date month="April" year="2024"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2012 and GOST R 34.11-2012 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9558"/>
  <seriesInfo name="DOI" value="10.17487/RFC9558"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>


<?line 121?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors appreciate the comments and suggestions from the following
IETF participants in helping produce this document: Mark Andrews, Brian
Dickson, Paul Wouters and the many members of the DNSOP working group
that discussed this draft.</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-gost</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA81YXW/bOBZ9568g3JcEqJw4SXcnxmB3PEnaGtPEHTtpMTsY
LGiJkbiWSC1JxWMM8t/3XFK2ZKdb7PRpgX5IFHnvued+0kmSMK98Kcd8MJeV
eZI8k7WVqfAy4+9mi3suytxY5YvK8UdrKi5Sr7CtcZKvsaw0v75bLG6uBkws
l1Y+jfntA47dze7bD2Ebv7m6Skgey0yqRQWFmRWPPlHSPyaZdqZOqsb5RBuf
yDRNcoOX0xEjJACwGXPnM6ZqO+beYuPZ6enl6Rlz3kpRjfn05v4tY3gVOvun
KI2Ggo10rFZj/qs36WvujMXeR4enTRUfAKUSda10/htjovGFsWPGeYK/nCvt
xvzzkL8XNhMracNiRP5Zuv1lY/Mxf1hcnUwX07AgK6HKMSfjfijanW6opX8h
/qemElb1hQtrpe6vB+nvjMlL2Re+Dht/WIWNQTbTxlaC3ENmzN9enY1Gl+3j
m8vz8/bx8vwvF2OGZ/jnp5tfkunkbjIOkjsOOjz0NSx4YXPpESiF97Ubn5ys
1+uhEloMAfBEOKdyXUnt3QncmTiZJgidRDfVErZ/aW34e+GrchCFxyC8NrBN
8zto5ouN87LiC5k2iL8NP4rhdMwn24jkd1EQmbL4JjO+aoVLrE38ppZuH6Ms
ZQ6WjeYLbJYWyBbHfC6daWwq8ZAam/Gj+fyY3+M0v1a5dL6D7RhT+vHAVZcX
l1tXXb558x38w5Ik4WKJCEfKMXZfKEcR2xA6bqVXFmHoi5iK5nGXYftpOYxy
KpVlCB/2ik+1tyZrUjKApO7Ok6hwfs7PL4aj0wQpNuLIp/7qKLm86JcE0sXo
JLR1rrr53UvtoMB1Xvu1jbzfELidIagySrM//mgj9Pl5yAEJgPza7OmRdq80
LTcB78xm8H+Lnr2VeBMln+RSpxsOivm9TAutUizOZd6U0W1k060EDaXJN3R4
3sDvgh3NjQsVRFh/DFx80uQoNfzsdHT2OpwKMFxTQyl0BRiBnC1hozO2IyzS
RWvwlqtlqJvlJhi45fzg8I5t1ju8cyVXB7zxwBuFy/NzxOcM73HJCjC9lKgm
lcgkf6+cB5/pkNzeoP75AyB7jj+qNBoCuAvfEkTXcVDxhYBgAKYNR9XNkQ1w
kamAkfghF5CGzoYIGXEAVzN2ZzxcXQiPf/rhnRlJIj1PCwGhKIE8Uy6Fm16A
/jr10PHqFXz/7wbpEvKaxIoY/Mhp8sVKbvgaKev4gFrX4HX8n1oYPc9vfn6Y
zm+u6XnxfvLhw+4h7iAxeJ89fGi30FN3+Gp2e3tzdx3PU1c8WLqd/BJlEPrB
7OP9dHY3+TAgyvY5EQg9b+BPfPLSIhUoCiiXpEutWsqMhb7Cf7z6yEcXkWnq
AM/PeP47Xr4b/RW083UhdQwXo8tN+wpaNxzNUArbihFlyVNRKy9KxAr0uMKs
NS+QAsQq6mDMRrTPrvb0Unbn81hlDotIL067U93ssAxezgI6lqLJBz3XixBe
8NWQ80+iVFlcR4KZ8olKQRBAQ4F/EaXdYbIGDZjKlYSg6SOFrwEFtqeBIkyk
qaxBMxBsam9yK+oCGdGzkrwintCQxbKUMaWoFG5lLGVp1qE4ZV3bqA08GJHC
zAA2enKHKVK2Y/VPcMW3XLHY3YOf5/PF9N3/zhzb2x8lUjLT+NdK3X5rHAnx
oWT3WcEfzRqNUllj7iLrth+He3Tva+oxzvcYZ19n/OmlPdGcFC1IoSkED6C5
m1QFU+y2WfcCYtqR/6prZVethOA5d9iGlSZyXNuI3fZQ203bkgcVLs4yyw3L
elnTMyrUwApj4ra2mZJgH3Ta3hQtLbpJRrtdADyrW4xodYeY/4FxmCN3yctA
iKnRI++hjUAcTg9L4fruCmnflBi9UdMzYo87QEkLqkWH8DCrxB6wny40pOvc
F0AacyNHJ7IKrMW6RLMPIjsq4rU1hVoqaglSQVSpQtmGuqYujchCma+bZalc
cQi7Vx/CrIOh7wUbYRFOtGgKmMtwCqKdDPr44AF0UNdqfUcTHliiQr3/hW1z
yGj6OK3qMvSXLx8Otf1Le/piEK1lU2nXC58uDl8MvVsaN5ieeoM8eCTpO16O
zs6PycBtsUD2d00XofikTOPKDfua8f8dfm8YHrAt/DAkiRKJkW06vX+S+J7g
b+J+7/w30T94MbcPdpwjcNsbB6YsEnfY3Y7+b1in6X8p0hXlwyRdabMuZZaH
USh2mXhbctT8kTshwwlWHOK8i3NlkxMXYaIPbYB2PJoSzY1aDd2+eY2pWaWq
FnRI0aBQ0tWa8hnXDbk/zYz5rbArPtGZlWuMFz9a3MHYtUpXzmAa+Siakn82
jadAJwCkrxIaVUvG6O9yZPaRprdQy3JrmpoFkttxkYIs6KUfG0JNuIoFsNdH
GycwYpYS03lLSUuzS4XWrQn/wvxO4/4ntfLkiGZVmCetAri93wMKlRcl/vrY
E9p6S3eX0myCIwH9CVd2REC/gBodmtT2co17iHdD3Jrp0uyNKV24oMLNS6c8
NanvUTn5TaYAZ8wRJCiAnIYM31LtZLjjoWrSyEH1Mg0h8zdi4R2UNkv+CVTS
nsBmzz2MfS5UeeAzyt1GU1vKiCtT0+JrjkoNnmgIeVJyLTO0ZNxYV3hgjwoz
JA2MuM5uDcuD5iHC62T7y8hJ/Clo+3r4cxD9FMTYfwAvgFKdqxIAAA==

-->

</rfc>

