Nick,
On 14/06/2019 04.18, Nick Johnson wrote:
I'm working on a system that needs to authenticate a TLD owner/operator
in order to take specific actions. We had intended to handle this by
requiring them to publish a token in a TXT record under a subdomain of
nic.tld, but it's been brought to our attention that we can't rely on
nic.tld being owned by the TLD operators - this is only a reserved
domain on ICANN new-gTLDs, not on ccTLDs or older gTLDs.
An alternative is to require a message signed by the TLD's DNSSEC zone
signing key, but I'm uncertain whether it's practical for TLD operators
to sign arbitrary messages using their keys
If people are using HSM running in restricted environments, then getting
them to sign arbitrary records will be hard - by design!
What you're asking for is not something that exists today, so TLD
operators are not going to have processes for it. That means that it's
going to be impractical (meaning "this will require process and
engineering changes, and therefore cost money") for some (if not all)
TLD operators.
My own advice would be to design a system that works well for the early
adopters - whichever TLD operators you are talking to now that might be
interested. You can add additional mechanisms later. In the end you may
end up with a dozen or so methods, but that shouldn't be surprising
given the diversity of TLD operators.
One final note: DNSSEC is not really designed for historical
attestations. It's designed to give you a trustworthy view of a small
corner the DNS *right now*. This is a completely different requirement
from blockchain where the idea is to be able to go back to any (?)
historical transaction and verify it. So even if you can authenticate
that someone holds the private material for a DNSKEY today, that won't
mean anything to someone wanting to audit that 10 years from now. In
terms of design, you need to find some way to convert the authentication
that you get today into a historical record (like maybe requiring that a
significant number of people verify the authentication and put that in
your blockchain as the historical record).
Cheers,
--
Shane
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop