Skip to main content

Use of GOST 2012 Signature Algorithms in DNSKEY and RRSIG Resource Records for DNSSEC
draft-ietf-dnsop-rfc5933-bis-07

The information below is for an old version of the document.
Document Type
This is an older version of an Internet-Draft whose latest revision state is "Replaced".
Expired & archived
Authors Dmitry Belyavsky , Vasily Dolmatov
Last updated 2022-05-16 (Latest revision 2021-11-12)
Replaces draft-belyavskiy-rfc5933-bis, draft-dnsop-rfc5933-bis
Replaced by draft-makarenko-gost2012-dnssec
RFC stream Internet Engineering Task Force (IETF)
Formats
Reviews
Additional resources Mailing list discussion
Stream WG state In WG Last Call
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document describes how to produce digital signatures and hash functions using the GOST R 34.10-2012 and GOST R 34.11-2012 algorithms for DNSKEY, RRSIG, and DS resource records, for use in the Domain Name System Security Extensions (DNSSEC). This document obsoletes RFC 5933 and updates RFC 8624.

Authors

Dmitry Belyavsky
Vasily Dolmatov

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)