On 2 Aug 2019, at 15:30, Bob Harold <rharo...@umich.edu> wrote:

> I just had what might be a crazy idea.
> What if the covert data was encrypted, and could be transferred normally, but 
> only someone with the key could read it?
> It could then be put in a new record or in TXT records.
> Requires a tool (script) to read/write it, but no changes to the DNS servers.
> Does that make any sense?

To my eye (such as it is) Olafur is on the right track with this. This is a 
provisioning problem, not a DNS problem.

I think it makes more sense to consider the zone as just one parameter in a DNS 
workload; other parameters like master servers, zone-specific configuration, 
NOTIFY lists, etc are additional parameters. Together they make up a blob of 
DNS provisioning workload. I think the ability to include RRSet metadata 
(comments, change history, authorisation, data provenance, whatever) in such a 
blob is most simply a further deconstruction of the "zone" member of that blob.

I do see the benefits of standardising DNS provisioning in general. I would 
love to be able to have a standard mechanism to add a blob such as that 
imagined above to an anycast cloud of authoritative DNS servers, for example, 
instead of having to jump through provider-specific flaming hoops of tickets 
and APIs.


Joe

Attachment: signature.asc
Description: Message signed with OpenPGP

_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to