Section 5.7 of  draft-ietf-dnsop-domain-verification-techniques-05 says

   Some Application Service Providers currently require the Validation
   Record to remain in the zone indefinitely for periodic revalidation
   purposes.  This practice should be discouraged.  Subsequent
   validation actions using an already disclosed secret are no guarantee
   that the original owner is still in control of the domain, and a new
   challenge needs to be issued.

However, this draft implicitly takes the opposite view, as the authors refer to 
systems that require their validation records to be published as long as the 
corresponding association exists.

I think the discrepancy is very interesting.  We need to distinguish "this 
domain is authorized by account $X" and "this domain authorizes account $X".  
When performed in the DNS, the former requires a secret and applies to a point 
in time; the latter requires no secrets and applies continuously.

In general, I think the latter is probably simpler, easier to manage, and more 
secure.  Perhaps the DCV draft ought to note this.

--Ben
________________________________
From: Sheth, Swapneel <ssheth=40verisign....@dmarc.ietf.org>
Sent: Monday, August 5, 2024 12:04 PM
To: dnsop@ietf.org <dnsop@ietf.org>
Cc: Kaizer, Andrew <akai...@verisign.com>; br...@blueskyweb.xyz 
<br...@blueskyweb.xyz>; nick@ens.domains <nick@ens.domains>
Subject: [DNSOP] Request Feedback: draft-sheth-dns-integration

DNSOP, Just before IETF 120 we published a draft "Integration of DNS Domain 
Names into Application Environments: Motivations and Considerations" along with 
co-authors from Bluesky and Ethereum Name Service. You may have seen us 
socializing


DNSOP,

Just before IETF 120 we published a draft "Integration of DNS Domain Names into 
Application Environments: Motivations and 
Considerations<https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-sheth-dns-integration/__;!!Bt8RZUm9aw!5uGRf-jrspw4aqbJsmf_WDfAqdK4pnUYUTc4DrvcJhusAcikKdSv1rECFE6DI2WxQj0-qPJM2pr-FgfOlgmBmEB6a2w$>"
 along with co-authors from Bluesky and Ethereum Name Service.  You may have 
seen us socializing it at the hackathon and 
HotRFC<https://urldefense.com/v3/__https://datatracker.ietf.org/meeting/120/materials/slides-120-hotrfc-sessa-03-integration-of-dns-domain-names-into-application-environments-motivations-and-considerations__;!!Bt8RZUm9aw!5uGRf-jrspw4aqbJsmf_WDfAqdK4pnUYUTc4DrvcJhusAcikKdSv1rECFE6DI2WxQj0-qPJM2pr-FgfOlgmB72MD_wo$>
 or heard the request for feedback during Thursday's DNSOP session when the 
chairs mentioned it during the "Drafts of Note" of section.

During IETF 120 we received a lot of good feedback around this draft and would 
like further feedback!  Since the initial 00 version, we have changed the draft 
to informational and are in the process of evaluating how best to incorporate 
the other feedback we received.

The goal of this draft is to provide informational guidance to communities who 
are trying to incorporate DNS domain names into their applications.  The draft 
currently provides motivations for why applications opt to utilize domain names 
and qualities that applications should consider as they build and maintain 
their integrations, e.g., having processes in place to account for domain name 
lifecycle events or DNS protocol evolution.  We would appreciate feedback on 
the current draft and other motivations/qualities we should consider including 
that would make this draft as useful as possible to these communities.

We would be happy to take feedback here on the mailing list.

Thanks,
Swapneel Sheth


_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to