On Sat, Mar 8, 2025 at 7:01 AM Paul Hoffman <paul.hoff...@icann.org> wrote:
> Big thanks to the authors of
> draft-ietf-dnsop-domain-verification-techniques for the massive update
> in -07 to make it easier to follow. The document remains very
> important to help applications understand that domain control
> validation should not be "stuff TXT into the zone apex".

Thanks.

> Having said that, I would still like to see a major revision
> throughout the document to take it away from 2119-level SHOULDs and
> MUSTS for things that really should instead be "if your use case is
> $x, you should consider doing $y". The current wording makes it hard
> to implement some use cases, while later saying that those use cases
> are in fact valid.

Can you elaborate on what specific use cases have been made hard to
implement by the current text?

The only such use cases I'm aware of are applications that want to
use something in the DNS to perpetually assert some relationship
with the domain. Our draft states that for domain control validation
purposes, there should be only time limited challenge tokens that
should not be reused for domain control re-validation actions at a
future time, for reasons we explain in the draft.

I think those use cases are valid, but are a bit different from nonce
based DCV, and also require some additional attention to domain lifecycle
management issues. Swapneel Sheth (Verisign) and I have already been
talking about this topic this weekend in Bangkok, and I understand that
he is working on another draft to address some of this. My proposal would
be to add a caveat to the relevant section of the DCV doc, and work with
Swapneel to make sure the drafts are not in conflict with each other, which
should not be hard to do.

> It makes demands in many places that are only best
> practices for a subset of the intended readers, and that do not affect
> interoperability.

Again, can you elaborate?

Having said that, I do feel that some of the statements in the draft
are perhaps too strong and could be toned down. I'm fine with changing
many of the MUSTs to SHOULDs, as that would make the draft less antagonistic
to application providers that have not (yet) adopted these recommendations.

> My preference is that there are just two SHOULDs, both in the
> introduction: SHOULD NOT pollute the zone apex with TXT records, and
> SHOULD instead use underscore labels as described in the rest of the
> document.

The doc uses the term RECOMMENDED for the underscore label (which is
like SHOULD).

It does not distinguish the zone apex, as this applies generally to any
part of
a zone. Application providers may want to validate control of the domain
"finance.example.com" say, which may not be a zone but a subdomain within
the zone example.com, and could cause the same cluttering there.

> After that, couch every suggestion with reasoning, talk
> about how different use cases might cause you to do different things,
> and give more examples.

Specific use cases that may require persistent identifier records will be
described and tackled in Swapneel's draft.

Apart from that, I don't know of any cases that cannot be accommodated
by the recommendations in this draft. If you have any mind, please
describe them, and we can discuss.

> Many of the current SHOULDs and MUSTs are based on the use case of a
> certificate authority using ACME. That's a good use case, good enough
> where it should have its own section near the end (mentioned in the
> introduction) specifying how each of the options from throughout the
> document apply to that use case.

I don't think that's true. There isn't anything in the draft that is
specific to
the certificate authority/ACME use case. The one part that arguably was
the "scope of indication" mechanism, which was taken out in -07, and is
planned to be taken to ACME as a separate draft.

I look forward to hearing comments from my co-authors on this topic, and
others in the working group.

Shumon.
_______________________________________________
DNSOP mailing list -- dnsop@ietf.org
To unsubscribe send an email to dnsop-le...@ietf.org

Reply via email to