Edward Lewis schreef op 2025-01-22 18:11:
On Jan 22, 2025, at 10:35 AM, Ben van Hartingsveldt | Yocto <ben.vanhartingsveldt=40yocto....@dmarc.ietf.org> wrote:
1) User goes to DNS provider and creates zone.

I think there’s a problem with step 1. A user (which is any-off-the-street-customer) is not the source of authority when it comes to control or ownership of a domain. A user “claiming ownership” could itself be abusive towards a DNS provider in the sense that the user, well-intentioned or not, is making the DNS provider do potentially needless work. If there’s ill-intent, then this could be a denial of service via resource depletion.
Well, I assume that the registrar and the DNS provider are 2 different companies. The DNS provider allows every user to create a zone, but doesn't see the user as authority. Only when that user is able to put that ZDVT record in the DNS of the registry, it knows that that zone is also authoritive, because it only looks at the registry for matching tokens. This is like DNSSEC, right?

Authority for a domain’s existence comes down from the top of the tree. In the common scenario of something like “example.com”, then it is a TLD registry that is the chief authority. If the TLD works with registrars, then registrars are in position to be “sub-“authorities for the names they manage.
Technically, a registrar that is also a DNS provider can verify zones without any ZDVT record. However, when an those are seperate, as DNS provider I find it more trustworthy to query the DNS server of the registry for some token check, instead of asking a registrar over an API if that zone should be activated. I mean, if the registrar is authoritive for some domain, they can use the EPP protocol to modify the needed information on the registry side.

The flow has to be registry->registrar-if-there->DNS operator before a user can “create a zone.”
As told above, a DNS provider doesn't have control over that. I would rather say that you should call it "activate a zone", because you have to create a zone beforehand to get its ZDVT record.

The rest of the steps are means of verifying a claim in reverse, which is more work than just being able to directly consult the authority.
I think this isn't the way. If I want to activate my Google Search Console, I also put some TXT record in my DNS, it isn't the registrar that tells Google that I'm allowed to access that Google Search Console site.

2) DNS provider creates zone and gives ZDT token for that specific zone. 3) User copies the ZDT token that is given by the DNS provider and pastes it to some (new) field at the registrar. 4) Registrar sends the ZDT token to the registry using EPP. (Yes, we have to specify a EPP extension for this token.) 5) Registry uses this ZDT token as DNS record in their superzone. (example.com. IN ZDT "some-token-text")
6) User goes to DNS provider and verifies zone.
7) DNS providers checks record in the DNS zone of the registry and activates zone when correct.
8) User now pastes nameservers at registrar.
9) Registrar sends nameservers using EPP to registry.
10) Registry uses this nameservers in their superzone. The domain is now delegated without any possibility to hijack.

There’s no stopping a DNS operator from allowing a customer to run a domain that is not attached to the global public Internet DNS. Unless there’s a name collision with a domain that is attached to the global public Internet DNS, this could be done without easy detection. Aside - If there’s a name collision, then it’d be detectable but still may not be operationally impacting.
Technically no, but I assume that many DNS provider will not support a non-ICANN tree.

Questions to DNS providers - mean those hosting zones without bundled name registration services - do they want to only serve domains registered in the global public Internet DNS tree, or host anything so long as there is no conflict, or not care at all? Do they clean up customers that have left? I’ve am thinking of a specific situation where a provider's servers answered for zones only because the provider did not de-provision a customer they lost, per the “lost customer.”
Me as DNS provider am likely not supporting domains outside the ICANN tree in the near future. For now, without any deep thinking, it causes problems, and likely the answer is: use your own (self-hosted) DNS server. Possibly there will be some solution in the future, but not for now.

I hate to beat an injured camel, but the way forward to me lies in DELEG. The registry knows best and it can encode stuff into zone cut information, including allowed DNS providers - in plural - in an explicit way. A registrant would have to indicate this via the provisioning system (whether or not EPP is the underlying protocol) when administering the zone, which might make overall provisioning easier by eliminating the need to list DS, NS, and glue records, instead pointing to some DNS operator(s) to say “use their stuff.”
With this last paragraph, it seems like you mean that a CAA record-ish thing would be better, so including a list of "allowed DNS providers" in the registry zone. However, this is not going to solve this, because hijacking mostly happens at one DNS provider. I also read the world plural; I didn't write it previously, but I want to allow multiple ZDVT records next to each other, for people that want the same zone enabled at more DNS providers.

Ben
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to