Thanks for this helpful input!

(In theory DNSSEC could prevent falsified responses about scope, but I
realize that it's not widely deployed :(

Let's also think about the more general (non-ACME) application use case
too. Maybe multiple possible ways to indicate scope are needed.

Shumon.

On Tue, Feb 20, 2024 at 11:48 AM Amir Omidi <a...@aaomidi.com> wrote:

> There are some benefits in ACME for it being on the label (At least in the
> ACME use case):
>
> It being on the label provides external confirmation that the ACME server
> did the correct thing. If it's part of the response, it's a lot easier for
> an ACME server to falsely claim the scope was something other than what the
> client had set it to.
>
> The downside of it being up to three lookups doesn't apply to the ACME use
> case. The specific query that is going to be looked up has been described
> in the order object (wildcard, subdomain, or just host), so the ACME server
> will only be looking up one of these.
>
> The main reason we really brought the scoping model to the DNS-ACCOUNT
> (now SCOPED-DNS-CHALLENGES:
> https://datatracker.ietf.org/doc/draft-ietf-acme-scoped-dns-challenges/)
> was the verifiability of behavior we get out of it. If we move this out of
> the qname, then someone can challenge us by saying what do we get out of
> this that we can't get with CAA.
>
>
>
>
> On Mon, Feb 19, 2024 at 7:56 PM Shumon Huque <shu...@gmail.com> wrote:
>
>> On Mon, Feb 19, 2024 at 6:55 PM Paul Wouters <p...@nohats.ca> wrote:
>>
>>> On Sat, 17 Feb 2024, Shumon Huque wrote:
>>> > I'm sure other folks will chime in with their views. But I want to
>>> ping Paul Wouters specifically - since you are one of
>>> > the expert reviewers for this registry and an author of
>>> domain-verification, could you express your opinion on the
>>> > specific request related to ACME (a pre-existing entry in that
>>> registry) and its new scoped challenge specific labels.
>>>
>>> That registry is really weak. first come first serve. In theory, I
>>> wouldn't technically be able to stop someone else from registering
>>> _acme-elvis-my-way-challenge.
>>>
>>> The main goal of the registry is to avoid people inadvertently using the
>>> same name. As such, I might push back a little on very generic names,
>>> but things which clearly carve a namespace for general use like _acme,
>>> are fine.
>>>
>>
>> Thanks!
>>
>>
>>> Now speaking as author, not as the underscore registry expert:
>>>
>>> I'm not sure you would want the host/wildcard/domain difference in the
>>> QNAME though, because that might end up needing 3 DNS queries to find
>>> out. It would be best if things could come in with 1 DNS query. Make
>>> the variable part live in the RRdata, not the QNAME.
>>>
>>
>> Yup, I agree that would be better. The DCV draft already has other
>> examples of expressing application specific characteristics in
>> "name=value"
>> attributes of the resource record data (such an "expiry" attribute).
>>
>> Perhaps, we can propose a "scope=" attribute, that can take on the
>> 3 possible values of host/wildcard/domain. e.g.
>>
>> _acme-challenge.www.example.org. 300 IN TXT "gfj9XqxxxxxxRg85nM
>> scope=wildcard"
>>
>> or,
>>
>> _acme-challenge.www.example.org. 300 IN TXT "gfj9XqxxxxxxRg85nM"
>> "scope=wildcard"
>>
>> Eric (Nygren) - was there a compelling reason to encode the scope into
>> the qname label? Otherwise, I'm inclined to propose this change in
>> the draft.
>>
>> Shumon.
>>
>>
_______________________________________________
DNSOP mailing list
DNSOP@ietf.org
https://www.ietf.org/mailman/listinfo/dnsop

Reply via email to