On Tue, Oct 22, 2024 at 2:59 PM Ben Schwartz <bemasc=
40meta....@dmarc.ietf.org> wrote:

> I think this draft should offer more background on the problem space,
> describing the situations where these DCV patterns are appropriate or
> inappropriate.  In particular, I would like to see text clearly
> distinguishing two patterns:
>
> 1. "Domain Control Validation" -> Prove that the owner of this account
> controls this DNS name (by placing a random token in an ephemeral TXT
> record).
> 2. "Domain Account Authorization" -> Prove that the owner of the DNS name
> authorizes this account (by placing the account name in a persistent TXT
> record).
>

This draft is about the former - verifying that some entity has control
over a domain. There are misc examples about how specific applications
authorize something based on the result of the domain control
validation action, but the main topic of the draft is mechanisms for
performing DCV. Perhaps we should make that clearer.

Shumon.
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to