<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.6 (Ruby 3.2.4) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>

<?rfc docmapping="yes"?>

<rfc ipr="trust200902" docName="draft-hardaker-dnsop-must-not-ecc-gost-01" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="MUST NOT DNSSEC with ECC-GOST">Remove ECC-GOST from use within DNSSEC</title>

    <author initials="W." surname="Hardaker" fullname="Wes Hardaker">
      <organization>USC/ISI</organization>
      <address>
        <email>ietf@hardakers.net</email>
      </address>
    </author>
    <author initials="W." surname="Kumari" fullname="Warren Kumari">
      <organization>Google</organization>
      <address>
        <email>warren@kumari.net</email>
      </address>
    </author>

    <date year="2024" month="May" day="14"/>

    
    
    

    <abstract>


<?line 47?>

<t>This document retires the use of ECC-GOST within DNSSEC.</t>



    </abstract>



  </front>

  <middle>


<?line 51?>

<section anchor="introduction"><name>Introduction</name>

<t>The ECC-GOST algorithm <xref target="RFC5933"/> has been depreciated and
<xref target="RFC5933"/> has been made historic.  Thus, the use of ECC-GOST is no
longer needed and is not recommend for use in DNSSEC <xref target="RFC4033"/>
<xref target="RFC4034"/> <xref target="RFC4035"/>.</t>

<t>This document retires the use of ECC-GOST within DNSSEC.</t>

<section anchor="requirements-notation"><name>Requirements notation</name>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY",
   and "OPTIONAL" in this document are to be interpreted as described
   in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they appear
   in all capitals, as shown here.</t>

</section>
</section>
<section anchor="deprecating-ecc-gost-algorithms-in-dnssec"><name>Deprecating ECC-GOST algorithms in DNSSEC</name>

<t>The GOST R 34.11-94 <xref target="RFC5933"/> algorithm MUST NOT be used when
creating DS records.  Validating resolvers MUST treat GOST R 34.11-94
DS records as insecure.  If no other DS records of accepted
cryptographic algorithms are available, the DNS records below the
delegation point MUST be treated as insecure.</t>

<t>The ECC-GOST <xref target="RFC5933"/> algorithm MUST NOT be used when creating
DNSKEY and RRSIG records.  Validating resolvers MUST treat
RRSIG records created from DNSKEY records using these algorithms as an
unsupported algorithm. If no other RRSIG records of accepted cryptographic
algorithms are available, the validating resolver MUST consider the
associated resource records as Insecure.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>This document increases the security of the DNSSEC ecosystem by
deprecating algorithms that make use of older algorithms with ECC-GOST
derived uses.</t>

</section>
<section anchor="operational-considerations"><name>Operational Considerations</name>

<t>Zone owners currently making use of ECC-GOST based algorithms should
immediate switch to algorithms with stronger cryptographic strengths,
such as those listed in the introduction.  DNS registries <xref target="RFC8499"/>
should prohibit their clients to upload and publish ECC-GOST based DS
records.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>IANA is requested to set the "DNSSEC Validation" of the "Digest
Algorithms" registry <xref target="DS-IANA"/> for GOST R 34.11-94 (3) to MUST NOT.</t>

<t>IANA is requested to set the "Recommended for DNSSEC Validation"
column of the DNS Security Algorithm Numbers registry <xref target="DNSKEY-IANA"/>
for ECC-GOST (23) to MUST NOT:</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC4033">
  <front>
    <title>DNS Security Introduction and Requirements</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>The Domain Name System Security Extensions (DNSSEC) add data origin authentication and data integrity to the Domain Name System. This document introduces these extensions and describes their capabilities and limitations. This document also discusses the services that the DNS security extensions do and do not provide. Last, this document describes the interrelationships between the documents that collectively describe DNSSEC. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4033"/>
  <seriesInfo name="DOI" value="10.17487/RFC4033"/>
</reference>

<reference anchor="RFC4034">
  <front>
    <title>Resource Records for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of resource records and protocol modifications that provide source authentication for the DNS. This document defines the public key (DNSKEY), delegation signer (DS), resource record digital signature (RRSIG), and authenticated denial of existence (NSEC) resource records. The purpose and format of each resource record is described in detail, and an example of each resource record is given.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4034"/>
  <seriesInfo name="DOI" value="10.17487/RFC4034"/>
</reference>

<reference anchor="RFC4035">
  <front>
    <title>Protocol Modifications for the DNS Security Extensions</title>
    <author fullname="R. Arends" initials="R." surname="Arends"/>
    <author fullname="R. Austein" initials="R." surname="Austein"/>
    <author fullname="M. Larson" initials="M." surname="Larson"/>
    <author fullname="D. Massey" initials="D." surname="Massey"/>
    <author fullname="S. Rose" initials="S." surname="Rose"/>
    <date month="March" year="2005"/>
    <abstract>
      <t>This document is part of a family of documents that describe the DNS Security Extensions (DNSSEC). The DNS Security Extensions are a collection of new resource records and protocol modifications that add data origin authentication and data integrity to the DNS. This document describes the DNSSEC protocol modifications. This document defines the concept of a signed zone, along with the requirements for serving and resolving by using DNSSEC. These techniques allow a security-aware resolver to authenticate both DNS resource records and authoritative DNS error indications.</t>
      <t>This document obsoletes RFC 2535 and incorporates changes from all updates to RFC 2535. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4035"/>
  <seriesInfo name="DOI" value="10.17487/RFC4035"/>
</reference>

<reference anchor="RFC5933">
  <front>
    <title>Use of GOST Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC</title>
    <author fullname="V. Dolmatov" initials="V." role="editor" surname="Dolmatov"/>
    <author fullname="A. Chuprina" initials="A." surname="Chuprina"/>
    <author fullname="I. Ustinov" initials="I." surname="Ustinov"/>
    <date month="July" year="2010"/>
    <abstract>
      <t>This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2001 and GOST R 34.11-94 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC). [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5933"/>
  <seriesInfo name="DOI" value="10.17487/RFC5933"/>
</reference>

<reference anchor="RFC8080">
  <front>
    <title>Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC</title>
    <author fullname="O. Sury" initials="O." surname="Sury"/>
    <author fullname="R. Edmonds" initials="R." surname="Edmonds"/>
    <date month="February" year="2017"/>
    <abstract>
      <t>This document describes how to specify Edwards-curve Digital Security Algorithm (EdDSA) keys and signatures in DNS Security (DNSSEC). It uses EdDSA with the choice of two curves: Ed25519 and Ed448.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8080"/>
  <seriesInfo name="DOI" value="10.17487/RFC8080"/>
</reference>


<reference anchor="DNSKEY-IANA" target="https://www.iana.org/assignments/dns-sec-alg-numbers/dns-sec-alg-numbers.xhtml">
  <front>
    <title>Domain Name System Security (DNSSEC) Algorithm Numbers</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>
<reference anchor="DS-IANA" target="http://www.iana.org/assignments/ds-rr-types">
  <front>
    <title>Delegation Signer (DS) Resource Record (RR) Type Digest Algorithms</title>
    <author initials="" surname="IANA" fullname="IANA">
      <organization></organization>
    </author>
    <date year="n.d."/>
  </front>
</reference>


    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC8499">
  <front>
    <title>DNS Terminology</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="A. Sullivan" initials="A." surname="Sullivan"/>
    <author fullname="K. Fujiwara" initials="K." surname="Fujiwara"/>
    <date month="January" year="2019"/>
    <abstract>
      <t>The Domain Name System (DNS) is defined in literally dozens of different RFCs. The terminology used by implementers and developers of DNS protocols, and by operators of DNS systems, has sometimes changed in the decades since the DNS was first defined. This document gives current definitions for many of the terms used in the DNS in a single document.</t>
      <t>This document obsoletes RFC 7719 and updates RFC 2308.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8499"/>
  <seriesInfo name="DOI" value="10.17487/RFC8499"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>


<?line 109?>

<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>TBD</t>

</section>
<section anchor="current-algorithm-usage-levels"><name>Current algorithm usage levels</name>

<t>The DNSSEC scanning project by Viktor Dukhovni and Wes Hardaker
highlights the current deployment of various algorithms on the
https://stats.dnssec-tools.org/ website.</t>

<t>[RFC Editor: please delete this section upon publication]</t>

</section>
<section anchor="github-version-of-this-document"><name>Github Version of this document</name>

<t>While this document is under development, it can be viewed, tracked,
fill here:</t>

<t>https://github.com/hardaker/draft-hardaker-dnsop-must-not-gost</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

