On Aug 30, 2006, at 6:57 AM, Wietse Venema wrote:

Douglas Otis:
A CNAME outside DNS also comes at the expense of adding a DNS transaction and a point of failure. A CNAME transcription error used at some point in the future may take a while to resolve when it does become problem. This may be difficult to resolve when the CNAME appears to point to a valid key. Scaling may create namespace densities where such errors are not always apparent and could be induced by either the provider or the domain owner. It is not as simple as put these CNAMES "here" pointing "there", the g=, s=, t= and TTL are also details a domain owner may wish to be able to alter.

Thanks for bringing up an argument that can be applied against any form of delegation.

This and other comments were specific to your suggestion. CNAME had been raised on the list, with the conclusion the less said the better. Discovering the cause of an expected problem is usually preceded with an anxious phone call, often late at night. Uncovering lame configurations subsequent to an automated rollover, or CNAME related failure requiring prodding are implementation specific. Unexpected problems are a serious pitfall however. It may not be long before support staff ban the "defective" service. These issues relate to postponed employment and fragile CNAME implementations outside the DNS.


Regardless of whether one uses DNS built-in methods (CNAME=leaf node delegation, NS=interior node delegation), or application- defined methods such as indirection via TXT records, there will be extra network I/O, there will be opportunity for bad TTL information, delegation to a non-existent target, and there will be loss of control over the information that a delegatee hands out.

CNAME can hide latent issues when used for "future" exchanges. The automated CNAME redirections outside the DNS are unfortunately less than elegant in some cases.


These issues are inherent with delegation, and since everything rides on top of DNS anyway, it seems to me that application-defined delegation methods that attempt to side-step DNS "problems" just add their own problems to it.

The number of entities involved in making a change represents a greater concern, not DNS itself. Scaling will be a sizable effort just for DKIM policy to enable millions of email-addresses to designate their "prolocutor of address validity". This does not involve restructuring DNS zones or cooperative efforts of 3 or 4 entities. A "prolocutor designate" must indicate when the email- address is valid. While validating an email-address is not a function of DKIM, "asserting" when an email-address is valid should be a function of DKIM that extends beyond the signing domain. Without this ability, the value of DKIM drops to its lowest denominator. The efforts to administer such designations can be done autonomously, and should not alter the "reputation" dynamics.

An email-address signed by a designated domain may be annotated differently than an email-address within the signing domain. This annotation still provides significant protections for millions of users. There is little to justify that allowing users to list a "prolocutor designate" is too complicated and a horrendous security concern. This sounds too much like "People still can't tell when their email is valid. Well, let them delegate their zones with NS records."

It is balderdash to describe designating a domain as representing a security concern in comparison to allocating one's namespace or allowing access to private keys. A designation does not affect the integrity of a signature one iota. It does allow market forces to elect "prolocutor designates" that have demonstrated the greatest integrity in a very democratic fashion. Three cheers for the "prolocutor designates". : )

-Doug

_______________________________________________
NOTE WELL: This list operates according to http://mipassoc.org/dkim/ietf-list-rules.html

Reply via email to