<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-must-not-ecc-gost-05" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with ECC-GOST">Deprecate usage of ECC-GOST within DNSSEC</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="May" day="20"/>

    
    
    

    <abstract>


<?line 53?>

<t>This document retires the use of GOST R 34.10-2001 (mnemonic
"ECC-GOST") within DNSSEC.</t>

<t>RFC5933 (now historic) defined the use of GOST R 34.10-2001 and GOST R 34.11-94
algorithms with DNS Security Extensions (DNSSEC). This document updates RFC5933
by deprecating the use of ECC-GOST.</t>

<t>[RFC Editor: please remove this before publication: It is unclear if updating
RFC5933 (a Historic document) is the correct thing to do or not. We did it
so that it shows up in Datatracker and similar, but this may be a
mistake. We are happy to change this if the RFC Editor / IESG / whoever thinks
this is a bad idea.]</t>



    </abstract>



  </front>

  <middle>


<?line 68?>

<section anchor="introduction"><name>Introduction</name>

<t>The use of the GOST R 34.10-2001 and GOST R 34.11-94 algorithms with
the DNS Security Extensions (DNSSEC) <xref target="RFC9364"></xref> was documented in
<xref target="RFC5933"/>. These two algorithms were deprecated by the Orders of the
Federal Agency for Technical Regulation and Metrology of Russia
(Rosstandart) in August 2012, and were superseded by GOST 34.10-2012
and GOST 34.11-2012 respectively. The use of GOST 34.10-2012 and GOST
34.11-2012 in DNSSEC is documented in <xref target="RFC9558"/>, and so <xref target="RFC5933"/>
has been made Historic.</t>

<t>Thus, the use of GOST R 34.10-2001 (mnemonic GOST-ECC) and GOST R 34.11-94
is no longer recommended for use in DNSSEC <xref target="RFC9364"/>.</t>

<t>Note that this document does not change or discuss the use of GOST 34.10-2012
and GOST 34.11-2012.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-ecc-gost-algorithms-in-dnssec"><name>Deprecating ECC-GOST algorithms in DNSSEC</name>

<t>The GOST R 34.11-94 <xref target="RFC5933"/> algorithm MUST NOT be used when
creating DS records.  Validating resolvers MUST treat GOST R 34.11-94
DS records as insecure.  If no other DS records of accepted
cryptographic algorithms are available, the DNS records below the
delegation point MUST be treated as insecure.</t>

<t>The ECC-GOST <xref target="RFC5933"/> algorithm MUST NOT be used when creating
DNSKEY and RRSIG records.  Validating resolvers MUST treat
RRSIG records created from DNSKEY records using these algorithms as an
unsupported algorithm. If no other RRSIG records of accepted cryptographic
algorithms are available, the validating resolver MUST consider the
associated resource records as insecure.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document potentially increases the security of the DNSSEC ecosystem by
deprecating algorithms that are no longer recommended for use.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>This document removes support for ECC-GOST. Zone operators currently making use
of ECC-GOST based algorithms should switch to algorithms that remain supported.
DNS registries should prohibit their clients from uploading and publishing
ECC-GOST based DS records to ensure that they are using algorithms which are
supported by DNSSEC validators, and so can be DNSSEC validated.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>[Note to IANA, to be removed by the RFC Editor: the registry fields
listed above will be created by draft-ietf-dnsop-rfc8624-bis.]</t>

<t>IANA is requested to set the "Use for DNSSEC Signing", "Use for DNSSEC
Validation", "Implement for DNSSEC Signing", and "Implement for DNSSEC
Validation" columns of the DNS Security Algorithm Numbers registry
<xref target="DNSKEY-IANA"/> <xref target="draft-ietf-dnsop-algorithm-update"/> for ECC-GOST (12) 
to MUST NOT.  Note that previously
the "Use for DNSSEC Signing" and "Implement for DNSSEC Delegation"
columns were already MUST NOT.</t>

<t>IANA is requested to set the "Use for DNSSEC Delegation", "Use for DNSSEC
Validation", "Implement for DNSSEC Delegation", and "Implement for DNSSEC
Validation" columns of the "Digest Algorithms" registry <xref target="DS-IANA"/>
for GOST R 34.11-94 (3) to MUST NOT.  Note that previously
the "Use for DNSSEC Signing" and "Implement for DNSSEC Delegation"
columns were already MUST NOT.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC5933">
  <front>
    <title>Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <author fullname="A. Chuprina" initials="A." surname="Chuprina"/>
    <author fullname="I. Ustinov" initials="I." surname="Ustinov"/>
    <date month="July" year="2010"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2001 and GOST R 34.11-94 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5933"/>
  <seriesInfo name="DOI" value="10.17487/RFC5933"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="draft-ietf-dnsop-algorithm-update" target="https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-algorithm-update">
  <front>
    <title>Algorithm Implementation Requirements and Usage Guidance for DNSSEC</title>
    <author initials="K." surname="W." fullname="Kumari, W.">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9558">
  <front>
    <title>Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="B. Makarenko" initials="B." surname="Makarenko"/>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <date month="April" year="2024"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2012 and GOST R 34.11-2012 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9558"/>
  <seriesInfo name="DOI" value="10.17487/RFC9558"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

</references>


<?line 143?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors appreciate the comments and suggestions from the following IETF
participants in helping produce this document: Mark Andrews, Steve Crocker,
Brian Dickson, Thomas Graf, Russ Housely, Shumon Huque, Paul Hoffman, S Moonesamy, Peter
Dickson, Peter Thomassen, Stefan Ubbink, Paul Wouters, Tim Wicinski,  and the
many members of the DNSOP working group that discussed this draft.</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-gost</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

