<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.2) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-ietf-dnsop-must-not-ecc-gost-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with ECC-GOST">Deprecate usage of ECC-GOST within DNSSEC</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2025" month="May" day="21"/>

    
    
    

    <abstract>


<?line 53?>

<t>This document retires the use of GOST R 34.10-2001 (mnemonic
"ECC-GOST") within DNSSEC.</t>

<t>RFC5933 (now historic) defined the use of GOST R 34.10-2001 and GOST R 34.11-94
algorithms with DNS Security Extensions (DNSSEC). This document updates RFC5933
by deprecating the use of ECC-GOST.</t>

<t>[RFC Editor: please remove this before publication: It is unclear if updating
RFC5933 (a Historic document) is the correct thing to do or not. We did it
so that it shows up in Datatracker and similar, but this may be a
mistake. We are happy to change this if the RFC Editor / IESG / whoever thinks
this is a bad idea.]</t>



    </abstract>



  </front>

  <middle>


<?line 68?>

<section anchor="introduction"><name>Introduction</name>

<t>The use of the GOST R 34.10-2001 and GOST R 34.11-94 algorithms with
the DNS Security Extensions (DNSSEC) <xref target="RFC9364"></xref> was documented in
<xref target="RFC5933"/>. These two algorithms were deprecated by the Orders of the
Federal Agency for Technical Regulation and Metrology of Russia
(Rosstandart) in August 2012, and were superseded by GOST 34.10-2012
and GOST 34.11-2012 respectively. The use of GOST 34.10-2012 and GOST
34.11-2012 in DNSSEC is documented in <xref target="RFC9558"/>, and so <xref target="RFC5933"/>
has been made Historic.</t>

<t>Thus, the use of GOST R 34.10-2001 (mnemonic GOST-ECC) and GOST R 34.11-94
is no longer recommended for use in DNSSEC <xref target="RFC9364"/>.</t>

<t>Note that this document does not change or discuss the use of GOST 34.10-2012
and GOST 34.11-2012.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-ecc-gost-algorithms-in-dnssec"><name>Deprecating ECC-GOST algorithms in DNSSEC</name>

<t>The GOST R 34.11-94 <xref target="RFC5933"/> algorithm MUST NOT be used when
creating DS records.  Validating resolvers MUST treat GOST R 34.11-94
DS records as insecure.  If no other DS records of accepted
cryptographic algorithms are available, the DNS records below the
delegation point MUST be treated as insecure.</t>

<t>The ECC-GOST <xref target="RFC5933"/> algorithm MUST NOT be used when creating
DNSKEY and RRSIG records.  Validating resolvers MUST treat
RRSIG records created from DNSKEY records using these algorithms as an
unsupported algorithm. If no other RRSIG records of accepted cryptographic
algorithms are available, the validating resolver MUST consider the
associated resource records as insecure.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document potentially increases the security of the DNSSEC ecosystem by
deprecating algorithms that are no longer recommended for use.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>This document removes support for ECC-GOST. Zone operators currently making use
of ECC-GOST based algorithms should switch to algorithms that remain supported.
DNS registries should prohibit their clients from uploading and publishing
ECC-GOST based DS records to ensure that they are using algorithms which are
supported by DNSSEC validators, and so can be DNSSEC validated.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>[Note to IANA, to be removed by the RFC Editor: the registry fields
listed above will be created by draft-ietf-dnsop-rfc8624-bis.]</t>

<t>IANA is requested to set the "Use for DNSSEC Signing", "Use for DNSSEC
Validation", "Implement for DNSSEC Signing", and "Implement for DNSSEC
Validation" columns of the DNS Security Algorithm Numbers registry
<xref target="DNSKEY-IANA"/> <xref target="draft-ietf-dnsop-rfc8624-bis"/> for ECC-GOST (12) 
to MUST NOT.  Note that previously
the "Use for DNSSEC Signing" and "Implement for DNSSEC Delegation"
columns were already MUST NOT.</t>

<t>IANA is requested to set the "Use for DNSSEC Delegation", "Use for DNSSEC
Validation", "Implement for DNSSEC Delegation", and "Implement for DNSSEC
Validation" columns of the "Digest Algorithms" registry <xref target="DS-IANA"/>
for GOST R 34.11-94 (3) to MUST NOT.  Note that previously
the "Use for DNSSEC Signing" and "Implement for DNSSEC Delegation"
columns were already MUST NOT.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC5933">
  <front>
    <title>Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <author fullname="A. Chuprina" initials="A." surname="Chuprina"/>
    <author fullname="I. Ustinov" initials="I." surname="Ustinov"/>
    <date month="July" year="2010"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2001 and GOST R 34.11-94 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5933"/>
  <seriesInfo name="DOI" value="10.17487/RFC5933"/>
</reference>
<reference anchor="RFC9364">
  <front>
    <title>DNS Security Extensions (DNSSEC)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="February" year="2023"/>
    <abstract>
      <t>This document describes the DNS Security Extensions (commonly called "DNSSEC") that are specified in RFCs 4033, 4034, and 4035, as well as a handful of others. One purpose is to introduce all of the RFCs in one place so that the reader can understand the many aspects of DNSSEC. This document does not update any of those RFCs. A second purpose is to state that using DNSSEC for origin authentication of DNS data is the best current practice. A third purpose is to provide a single reference for other documents that want to refer to DNSSEC.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="237"/>
  <seriesInfo name="RFC" value="9364"/>
  <seriesInfo name="DOI" value="10.17487/RFC9364"/>
</reference>

<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="draft-ietf-dnsop-rfc8624-bis" target="https://datatracker.ietf.org/doc/html/draft-ietf-dnsop-rfc8624-bis">
  <front>
    <title>DNS Security Algorithm Numbers</title>
    <author initials="K." surname="W." fullname="Kumari, W.">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC9558">
  <front>
    <title>Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="B. Makarenko" initials="B." surname="Makarenko"/>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <date month="April" year="2024"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2012 and GOST R 34.11-2012 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC).</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9558"/>
  <seriesInfo name="DOI" value="10.17487/RFC9558"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

</references>


<?line 143?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The authors appreciate the comments and suggestions from the following IETF
participants in helping produce this document: Mark Andrews, Steve Crocker,
Brian Dickson, Thomas Graf, Russ Housely, Shumon Huque, Paul Hoffman, S Moonesamy, Peter
Dickson, Peter Thomassen, Stefan Ubbink, Paul Wouters, Tim Wicinski,  and the
many members of the DNSOP working group that discussed this draft.</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-gost</t>

<t>&lt;RFC Editor: please delete this section upon publication&gt;</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

