It appears that Tim Wicinski  <tjw.i...@gmail.com> said:
>This is one of those DNSOP documents that may not be relevant to those who
>implement DNS, or those who operate DNS infrastructure. It is relevant to
>Applications that use the DNS, and those who focus on what actually DNS
>records exist in zones.

I took a look and it is indeed greatly improved. Here are some
implementation issues that may or may not be worth addressing:

It says to put everything in a text record which is fine, but it
doesn't say anything about how to encode it. There are two competing
approaches. One says that the string boundaries in the record don't
matter, so combine all of the strings into one string. The other is to
treat each string as a token or expression, and the string boundaries
are the token or expression boundaries. The examples suggest the
former way, but it should say so. Alternatively, people checking
domain verification records need to say which way they're doing it.

Wildcards can cause some annoying problems, notably that a wildcard
will match any tagged name so queries for tagged names can get junk
answers.  

A) Should verification records have a tag at the front of the data to
identify the record type? There's plenty of prior art for this, e.g.,
the 63 text records at stanford.edu. Or you might say that a
sufficiently long random token in the interesting part will prevent
false positives so there's no need.

2) If you put records at a tagged name that is supposed to be unique
and a query returns some junk records and some plausibly good records,
what do you do? Use what you can? Ignore it all because you probably
stepped on a wildcard?

Minor nit: why are the CNAME targets quoted?  I've never seen a
quoted target name and when I look at RFC 1034 it doesn't look
like it's valid.

R's,
John

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to