<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.3.7) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-must-not-ecc-gost-03" category="std" consensus="true" submissionType="IETF" updates="5933" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with ECC-GOST">Deprecate usage of ECC-GOST within DNSSEC</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="February" day="18"/>

    
    
    

    <abstract>


<?line 46?>

<t>This document retires the use of ECC-GOST within DNSSEC.</t>

<t>RFC5933 (now historic) defined the use of GOST R 34.10-2001 and GOST R 34.11-94
algorithms with DNS Security Extensions (DNSSEC). This document updates RFC5933
by deprecating the use of ECC-GOST.</t>

<t>[RFC Editor: please remove this before publication: It is unclear if updating
RFC5933 (a Historic document) is the correct thing to do or not. We did it
so that it shows up in Datatracker and similar, but this may be a
mistake. We are happy to change this if the RFC Editor / IESG / whoever thinks
this is a bad idea.]</t>



    </abstract>



  </front>

  <middle>


<?line 60?>

<section anchor="introduction"><name>Introduction</name>

<t>The use of the GOST R 34.10-2001 and GOST R 34.11-94 algorithms with
the DNS Security Extensions (DNSSEC) <xref target="RFC9364"></xref> was documented in
<xref target="RFC5933"/>. These two algorithms were deprecated by the Orders of the
Federal Agency for Technical Regulation and Metrology of Russia
(Rosstandart) in August 2012, and were superseded by GOST 34.10-2012
and GOST 34.11-2012 respectively. The use of GOST 34.10-2012 and GOST
34.11-2012 in DNSSEC is documented in <xref target="RFC9558"/>, and so <xref target="RFC5933"/>
has been made Historic.</t>

<t>Thus, the use of GOST R 34.10-2001 (mnemonic GOST-ECC) and and GOST R 34.11-94
is no longer recommended for use in DNSSEC <xref target="RFC9364"/>.</t>

<t>Note that this document does not change or discuss the use of GOST 34.10-2012
and GOST 34.11-2012.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-ecc-gost-algorithms-in-dnssec"><name>Deprecating ECC-GOST algorithms in DNSSEC</name>

<t>The GOST R 34.11-94 <xref target="RFC5933"/> algorithm MUST NOT be used when
creating DS records.  Validating resolvers MUST treat GOST R 34.11-94
DS records as insecure.  If no other DS records of accepted
cryptographic algorithms are available, the DNS records below the
delegation point MUST be treated as insecure.</t>

<t>The ECC-GOST <xref target="RFC5933"/> algorithm MUST NOT be used when creating
DNSKEY and RRSIG records.  Validating resolvers MUST treat
RRSIG records created from DNSKEY records using these algorithms as an
unsupported algorithm. If no other RRSIG records of accepted cryptographic
algorithms are available, the validating resolver MUST consider the
associated resource records as insecure.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document potentially increases the security of the DNSSEC ecosystem by
deprecating algorithms that are no longer recommended for use.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>This document removes support for ECC-GOST. Zone operators currently making use
of ECC-GOST based algorithms should switch to algorithms that remain supported.
DNS registries should prohibit their clients from uploading and publishing
ECC-GOST based DS records to ensure that they are using algorithms which are
supported by DNSSEC validators, and so can be DNSSEC validated.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to set the "Use for DNSSEC Signing", "Use for DNSSEC
Validation", "Implement for DNSSEC Signing", and "Implement for DNSSEC
Validation" columns of the DNS Security Algorithm Numbers registry
<xref target="DNSKEY-IANA"/> for ECC-GOST (12) to MUST NOT.  Note that previously
the "Use for DNSSEC Signing" and "Implement for DNSSEC Delegation"
columns were already MUST NOT.</t>

<t>IANA is requested to set the "Use for DNSSEC Delegation", "Use for DNSSEC
Validation", "Implement for DNSSEC Delegation", and "Implement for DNSSEC
Validation" columns of the "Digest Algorithms" registry <xref target="DS-IANA"/>
for GOST R 34.11-94 (3) to MUST NOT.  Note that previously
the "Use for DNSSEC Signing" and "Implement for DNSSEC Delegation"
columns were already MUST NOT.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC5933">
  <front>
    <title>Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <author fullname="A. Chuprina" initials="A." surname="Chuprina"/>
    <author fullname="I. Ustinov" initials="I." surname="Ustinov"/>
    <date month="July" year="2010"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2001 and GOST R 34.11-94 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5933"/>
  <seriesInfo name="DOI" value="10.17487/RFC5933"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9558">
  <front>
    <title>Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="B. Makarenko" initials="B." surname="Makarenko"/>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <date month="April" year="2024"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2012 and GOST R 34.11-2012 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9558"/>
  <seriesInfo name="DOI" value="10.17487/RFC9558"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>


<?line 131?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors appreciate the comments and suggestions from the following IETF
participants in helping produce this document: Mark Andrews, Steve Crocker,
Brian Dickson, Russ Housely, Shumon Huque, Paul Hoffman, S Moonesamy, Peter
Dickson, Peter Thomassen, Stefan Ubbink, Paul Wouters, Tim Wicinski,  and the
many members of the DNSOP working group that discussed this draft.</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-gost</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

