-------- Original message --------From: Joe Abley <jab...@hopcount.ca>On 2 Aug 
2019, at 15:30, Bob Harold <rharo...@umich.edu> wrote:>> I just had what might 
be a crazy idea.>> What if the covert data was encrypted, and could be 
transferred normally, but only someone with the key could read it?>> It could 
then be put in a new record or in TXT records.>> Requires a tool (script) to 
read/write it, but no changes to the DNS servers.>> Does that make any sense?> 
To my eye (such as it is) Olafur is on the right track with this. This is a 
provisioning > problem, not a DNS problem.> I think it makes more sense to 
consider the zone as just one parameter in a DNS > workload; other parameters 
like master servers, zone-specific configuration, > NOTIFY lists, etc are 
additional parameters. Together they make up a blob > of DNS provisioning 
workload. I think the ability to include RRSet metadata > (comments, change 
history, authorisation, data provenance, whatever) in such a blob > is most 
simply a further deconstruction of the "zone" member of that blob.I had a very 
similar thought.Recently,  I had an opportunity to set up some rather complex 
bind views where tsig's were needed to keep private views private while 
allowing multiple views to be transferred to the same host(s).It works rather 
well and could easily be rolled into something more general purpose./John> 
Joe_______________________________________________DNSOP mailing 
listDNSOP@ietf.orghttps://www.ietf.org/mailman/listinfo/dnsop
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to