>> Here's a concrete example.  My laptop is named mypc.example.com. Because
>> I am a forward thinking guy, I send a DANE-verified client cert whenever
>> I connect for submission, POP, IMAP, or jabber, and because I'm still
>> lazy, I use the same certificate for all of them.  The DNS records to
>> tell the world about that are:
>> 
>>  $ORIGIN mypc.example.com
>>  _submission._client._tcp IN TLSA ... cert stuff ...
>>  _imap._client._tcp       IN CNAME _submission._client._tcp
>>  _imaps._client._tcp      IN CNAME _submission._client._tcp
>>  _pop3._client._tcp       IN CNAME _submission._client._tcp
>>  _pop3s._client._tcp      IN CNAME _submission._client._tcp
>>  _xmpp-client._client._tcp IN CNAME _submission._client._tcp
>> 
>> How would you do it?
>
>Personally, I wouldn't use those owner names, as that's inconsistent
>with _tcp being associated with SRV usage, with the previous label being
>one from the IANA port registry.

See RFC 6698, which already uses _tcp to name TLSA server records.
This tries to minimize the extra creativity.

In case it wasn't clear, I was proposing to put "client" into the
port/service registry (same thing), as a pseudo-service.

>Thinking more though, I actually prefer _<service>._<proto>._client.
>The use of _client on the right-hand side would allow this to fit in
>Dave Crocker's "underscore registry" as the "most significant label",
>with everything to the left of that borrowed from SRV.

I suppose, but doing it as _<service>._client._<proto> puts it in the
existing service namespace.  It's not a huge difference, and it's been
clear for a while that if we do Dave's registry, part of what it
includes will be a list of the underscore names that are protocol
labels. That currently includes _tcp _udp _sip _xmpp _ldap _http _ocsp
so I suppose adding one more isn't awful, but it seems needlessly
kludgy.

R's,
John

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to