[dconn] Re: Secdir review of draft-kowalik-domainconnect-02
kowalik@denic.de Mon, 19 January 2026 10:48 UTC
Return-Path: <kowalik@denic.de>
X-Original-To: dconn@mail2.ietf.org
Delivered-To: dconn@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id E197FA9CEA4D; Mon, 19 Jan 2026 02:48:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=denic.de
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R3MmT_cYQcpE; Mon, 19 Jan 2026 02:48:18 -0800 (PST)
Received: from mout-b-202.mailbox.org (mout-b-202.mailbox.org [IPv6:2001:67c:2050:102:465::202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 0A2ACA9CE410; Mon, 19 Jan 2026 02:39:07 -0800 (PST)
Received: from smtp1.mailbox.org (smtp1.mailbox.org [10.196.197.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mout-b-202.mailbox.org (Postfix) with ESMTPS id 4dvn4c5bqFzDrRc; Mon, 19 Jan 2026 11:38:56 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=denic.de; s=MBO0001; t=1768819136; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=k0D4HhEJRT8ZZo1SJHmRx0nVELVourswl+0TEWpr890=; b=glCWnorhfjqivzGo/fgYGkKzDbvYaEQPyq72qCxID570ijt2y9tawzlwM3I9sk7mEoOuSp fet3pSlM7sdUheQ4EUyr8D64F/6gxe8e0vkXtsJZc2Zwwt093HGGFATZGlfbLH/e22nsah /yRoti8AkE5ld4EZdAkiX7zvFmY92zE5dyZVjGTyOkQC40vKIlq9Fr3oM30Dt7sZOfKguF yjFMKs8SQ/IZRoZAyC0YKqrWFrC8nK49zTlgTB0oWCj7Iv8FtS/KUrzXilnRG14Sx5vnYk uFNSg19OES8fkq8KDqwgSVxk/x3tkilVO0CycW9U4EhnLpi46zwLfDV1TyRFww==
Message-ID: <f09606ea-c4d8-40f0-8952-9a902dc6d9ed@denic.de>
Date: Mon, 19 Jan 2026 11:38:54 +0100
MIME-Version: 1.0
From: kowalik@denic.de
To: Charlie Kaufman <charliekaufman@outlook.com>, "secdir@ietf.org" <secdir@ietf.org>, "iesg@ietf.org" <iesg@ietf.org>, "draft-kowalik-domainconnect.all@ietf.org" <draft-kowalik-domainconnect.all@ietf.org>, "dconn@ietf.org" <dconn@ietf.org>
References: <DS0PR20MB5638AE44BE7620816FBDD2EFDFB4A@DS0PR20MB5638.namprd20.prod.outlook.com>
Content-Language: en-GB, de-DE
In-Reply-To: <DS0PR20MB5638AE44BE7620816FBDD2EFDFB4A@DS0PR20MB5638.namprd20.prod.outlook.com>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg="sha-512"; boundary="------------ms080204090902030408060105"
X-MBO-RS-META: rj9y83c44dc3r4ezt8cbwyn6szutrgm7
X-MBO-RS-ID: d8177739f6ea73a469e
Message-ID-Hash: 73U2TH2G7RAWX5CG5SUGB4QXJHAWG7Q7
X-Message-ID-Hash: 73U2TH2G7RAWX5CG5SUGB4QXJHAWG7Q7
X-MailFrom: kowalik@denic.de
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [dconn] Re: Secdir review of draft-kowalik-domainconnect-02
List-Id: "Domain Connect is a protocol that makes it easy for a user to configure DNS for a domain running at a DNS provider to work with a Service running at an independent Service Provider." <dconn.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dconn/J3y-BCQyLV05hqC-8lRJkqZWAus>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dconn>
List-Help: <mailto:dconn-request@ietf.org?subject=help>
List-Owner: <mailto:dconn-owner@ietf.org>
List-Post: <mailto:dconn@ietf.org>
List-Subscribe: <mailto:dconn-join@ietf.org>
List-Unsubscribe: <mailto:dconn-leave@ietf.org>
Hi Charlie, Thank you for your early review, Commented below with [PK]. On 22.12.25 07:50, Charlie Kaufman wrote: > Reviewer: Charlie Kaufman > Review result: Has Issues > > I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. > > This document specifies a protocol by which operators who to update DNS entries maintained by a third party DNS provider can request such changes in a standardized way. While the document doesn't say, I infer that today third party DNS providers all have their own mechanisms for accepting such requests and large operators who must work with many third parties have to learn how to deal with each one. If so, a protocol of this sort seems woefully overdue and would be welcomed by the community. DNS providers would face pressure to support the protocol. > > I'm concerned that this standards track RFC is coming in as an individual contribution. I would expect there to be widespread interest and that the authors would find or start an appropriate working group. [PK] This is now an adopted WG document (DCONN WG). > > This is not my area, so many of my comments may be ill-informed, but I will offer them anyway for whatever they are worth. > > Section 3.2: Use Cases out of scope says: > > While Domain Connect offers significant advantages in automating DNS > configuration, it's important to recognize scenarios where it might > not be the ideal solution: > > * *Automation or CI/CD Pipelines:* Domain Connect is primarily > designed for user-driven DNS configuration, where an end user > grants consent and applies changes. Automating this process > within CI/CD pipelines or other automated workflows can be > challenging, as it requires obtaining and securely storing OAuth > tokens beforehand. However, if authorisation tokens are pre- > obtained from a user-driven setup process, Domain Connect can be > also integrated into automation workflows. > > I would think that an automated deployment pipeline would be the common case and that the protocol should be designed for that case, where manual "user-driven" configuration is a necessary but hopefully uncommon case. This has immediate security implications, in that it would be appropriate to support some authentication protocol like using PKIX certificates for TLS authentication of people or processes rather than using OAuth (which is aimed at authenticating human users). I couldn't tell how difficult it would be to be agile with respect to security mechanisms or how difficult it would be to work with OAuth. [PK] Complexity of such considerations was so far the main issue to put it out of scope or park at least. Automated DNS configuration by a technical system is usually addressing a different problem definition (a.k.a. standardised DNS configuration API), where likely the securities and trust model of domain connect are oversized or even not necessary at all. Anyway I would be happy to see discussion on this on the mailing list in case anyone considers this problem worth solving. > I'm suspicious of the synchronous flow. Is it common for DNS providers to be able to make updates in real time? I would expect - especially in cases where DNSsec is supported - that it might be better to be able to accept a request (so the sender is guaranteed it will happen eventually, possibly with an estimate or commitment as to how long it will take) rather than delaying a response until the update is completed, especially given that if there is a crash while waiting the requestor doesn't know whether he has to resubmit it. [PK] The synchronous flow does not mean the changes are deployed and propagated. "the sender is guaranteed it will happen eventually" is what actually shall happen. I will take into the text if it may be put more explicit. > > Section 5.2.1 is very confusing. It is trying to express what trust various components are placing on others (I think). But it comes off as either being obvious or expressing something so subtle that it goes over my head. [PK] There was an explicit request from the previous discussion to add trust model. Maybe now it's too verbose. I will take a look. > > I really like the idea (in Section 7) of posting configuration information in DNS, though it is sufficiently rare that I wonder whether the DNS folk will object. [PK] DNS is only holding a pointer to a configuration end-point (link domain->provider) via simple TXT record on _domainconnect label, the configuration itself is an HTTP endpoint. > And posting information about how the information should be displayed on the user's screen seems over the top. [PK] Yes, this feedback comes a lot and will be even more reduced in the next version. > > Nits: > > Section 3.2 vs. Section 8.2.1.2: authorization or authorisation -- pick a spelling and stick with it. > > Section 4: "mean of communication" -> "means of communication" > > Section 7: "suceeds" -> "succeeds" > > Section 8.4.1: "asyncronous" -> "asynchronous" > > Section 8.4.3: "primarly" -> "primarily" > > Section 8.4.3: "temporarilly_unavailable" -> "temporarily_unavailable" > > Section 10.3: "specifed" -> "specified" > > Section 10.4: "desireable" -> "desirable" [PK] Noted, thanks. Kind Regards, Pawel
- [dconn] Re: Secdir review of draft-kowalik-domain… Peter Thomassen
- [dconn] Re: Secdir review of draft-kowalik-domain… kowalik
- [dconn] Re: Secdir review of draft-kowalik-domain… Pawel Kowalik