On Wed, Jan 13, 2016 at 05:41:09AM -0000, John Levine wrote:

> I admire the faith you have in DNS operators, but find it baffling.
> For a lot of the ones I know, their heads would explode at having to
> mix TXT SPF records for the incoming mail and TLSA for the outgoing
> mail at the same names in the same zone files.  They'd probably try
> to kludge it with CNAME and break everything.

The TXT SPF records will be a the zone apex.  The _smtp-client (or
just _smtp) prefix will be for each client MTA!  There's little
opportunity for collisions, except at domains with just a single
node at the zone apex holding all the records and not even using
a hostname under the domain for outgoing connections as a mail
client.  If that domain operator needs CNAMES for the client
TLSA record (to where???) they can create a suitable sub-domain
for the client name.

        ; zone apex MX record
        example.com. IN MX 0 smtp.example.com.

        ; zone apex SPF record
        _spf.example.com. IN TXT ...

        ; MX host A record
        smtp.example.com. IN A 192.0.2.1[

        ; SMTP client
        _smtp.smtp.example.com. IN TLSA 3 1 1 ...

        ; SMTP server
        _25._tcp.smtp.example.com. IN CNAME _smtp.smtp.eample.com.

        
> We already have a managed service namespace, which you can use with
> trivial ease as _<service>._client._tcp.<domain>.  But I'm hearing no,
> to save 12 characters in the domain name, and 12 lines of code in the
> clients, we'll tell people to make up random prefixed names and when
> the collisions inevitably happen, it won't be our problem.

It is zero extra lines of code, but what do these extra bytes buy us?

-- 
        Viktor.

_______________________________________________
dane mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dane

Reply via email to