[DNSOP] Re: [Ext] Persistence of DCV, including for Delegated DCV (for draft-ietf-dnsop-domain-verification-techniques)

Erik Nygren <erik+ietf@nygren.org> Mon, 09 June 2025 16:29 UTC

Return-Path: <nygren@gmail.com>
X-Original-To: dnsop@mail2.ietf.org
Delivered-To: dnsop@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 595E532BD061 for <dnsop@mail2.ietf.org>; Mon, 9 Jun 2025 09:29:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.393
X-Spam-Level:
X-Spam-Status: No, score=-1.393 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.001, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URI_NOVOWEL=0.5] autolearn=ham autolearn_force=no
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YQMyiZn1jPcN for <dnsop@mail2.ietf.org>; Mon, 9 Jun 2025 09:29:16 -0700 (PDT)
Received: from mail-lf1-f45.google.com (mail-lf1-f45.google.com [209.85.167.45]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id C791C32BD04F for <dnsop@ietf.org>; Mon, 9 Jun 2025 09:29:16 -0700 (PDT)
Received: by mail-lf1-f45.google.com with SMTP id 2adb3069b0e04-54b09cb06b0so5166864e87.1 for <dnsop@ietf.org>; Mon, 09 Jun 2025 09:29:16 -0700 (PDT)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1749486555; x=1750091355; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=lIgA4h4e7JXaMD2uJwqDCFr13OMVgONjt3IAivUkJgk=; b=KSohZ3EXRPVLGrKROoO1Y0Waof69nIA57GA9vfQI09qBFzS7BA5GbFgnof2orAfe8S 9rpC8FMvZBH1KglKxec/IbUjcBsjHNtmzoXCSN07NmQ8UYjRIQvtVVmYjYLsY1kRtj+u hVT5Zc0Ygt9skde+6EkxWOGy9l/780/NS2pZb0TgxRHTL9Wz7Ok9LHwAYc5Nq3tWYKtv s4aDdGxZo0HX5LJedcri1eUlewPKElClnaLTUMSQFBy7P47/vSv6iRs9HOuUJ9/+Qn32 wZiIhJ4ma2hnP5QxH1ulOIg4GGzagarp2UzPMwVB+P5sRZhHJsGlyEwe2buU8p4B2kfq UfoA==
X-Forwarded-Encrypted: i=1; AJvYcCW9GqtgSHKQGaBn3+9azJBHqYY4GZsfCvnfPyqLBtZJVTDjrP5eAXXDy9iof4Gjn84OJ7JFAQ==@ietf.org
X-Gm-Message-State: AOJu0YxOJN6uANsUg/462I3xWSsAVqhjIuCsI7BwqF5O/HKOSQDiKT4Z /T0khc6ygPEhVF/AwqwaAZyeTpi6jwJka1iL9CHNsVXXDNMfSkWqzgnxqPo/4D0CyWqyrxmw3TY wFWFs+l+7856XvUv7urMN0n4cvk4c81TA0MKLXyyaAw==
X-Gm-Gg: ASbGncs0Vxg394bLqkR954w3qva+ktY9/IlfBMyO9GeQvfIme9fqFn7L6jPufi7CbXm NBTmPZIIAOGI5fmviHpSdvGSA/g8SLHuk6GQ0/IoCL9JEpCkdTsGRccGokyRpswJbtymdsUlOT7 X4U6Vv0iRCF60u8+sAepe2gb1NKYBp0WSI6Ysm/Q6RcA1NkVECsesPcr1NhVVSRZwiu2fFMRTxY Ngv
X-Google-Smtp-Source: AGHT+IHnl0RRRtBD3aMQE+VwsY0MAa+2D1j+R2kD/vLj9+5PXch77jOWv3TpnGbjPbPSx1h+F3Dqo5tkLzaAN2R9Igs=
X-Received: by 2002:a05:6512:104a:b0:553:25e9:7f3a with SMTP id 2adb3069b0e04-55366c30559mr3687245e87.36.1749486555134; Mon, 09 Jun 2025 09:29:15 -0700 (PDT)
MIME-Version: 1.0
References: <CAKC-DJhS4_1P5Bqu-0YWWr9jkxBOt40rx5804UAUp7DhAsc31g@mail.gmail.com> <40408285-974A-4790-B653-DF4C3798F1E0@nohats.ca> <F7E48A3F-DA2C-4E54-92DA-90CD0EDE78DA@icann.org> <478e1879-93d4-4b0b-a99f-bbdb422bc073@taugh.com> <CAKC-DJh4ck_okAmdssMTfj5iq9X2o_-_Z6MzLQRSfZyjUJ3t6g@mail.gmail.com> <fcb3b846-7d2a-c567-2566-ba1614df31fa@taugh.com> <DM6PR15MB2361CDD15CABAEDA7CE91E45B36BA@DM6PR15MB2361.namprd15.prod.outlook.com>
In-Reply-To: <DM6PR15MB2361CDD15CABAEDA7CE91E45B36BA@DM6PR15MB2361.namprd15.prod.outlook.com>
From: Erik Nygren <erik+ietf@nygren.org>
Date: Mon, 09 Jun 2025 12:29:02 -0400
X-Gm-Features: AX0GCFuu8_Yf14epsfFlJ6tKLpEPuVv2XlMJJA55uevNuhb_tZL0pQnmvxgkIMg
Message-ID: <CAKC-DJgXHeagkvVJK6_uuuo7Gh=X=-DzkHLdp8U2wXBhXje6Kw@mail.gmail.com>
To: Ben Schwartz <bemasc@meta.com>
Content-Type: multipart/alternative; boundary="000000000000a882640637261483"
Message-ID-Hash: 565MJ4O4FKGWSYHXX4BGQFE63ABVEQYG
X-Message-ID-Hash: 565MJ4O4FKGWSYHXX4BGQFE63ABVEQYG
X-MailFrom: nygren@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-dnsop.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: John R Levine <johnl@taugh.com>, "dnsop@ietf.org" <dnsop@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [DNSOP] Re: [Ext] Persistence of DCV, including for Delegated DCV (for draft-ietf-dnsop-domain-verification-techniques)
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/4N56eD-ZOm_6fWNv_kYkBhvfeHo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Owner: <mailto:dnsop-owner@ietf.org>
List-Post: <mailto:dnsop@ietf.org>
List-Subscribe: <mailto:dnsop-join@ietf.org>
List-Unsubscribe: <mailto:dnsop-leave@ietf.org>

> In my view, the core problem is that the draft is dancing around an
unstated but essential requirement, for all DNS zones on the internet:

I think this is a reasonable summary.  For better or worse, domain control
validations are being used as what you describe as "validation-controlling
entities" today in both one-off and persistent manners.   The things you
list are likely some of the best practices needed to make them safe.

How should we capture this?  Do we want to incorporate this into both
"Purpose of DCV" as well as into some other section(s)?

Do we want to introduce this term Validation-Controlling Entries or just
use Validation Records as we have in the glossary already?  If they are
different how are they different?

      Erik








On Mon, Jun 9, 2025 at 10:50 AM Ben Schwartz <bemasc@meta.com> wrote:

> I think this PR is a fine direction, but it still seems to contain a
> certain amount of internal confusion.  If the security "relies on the
> causal relationship", then how can it be secure for persistent validation?
> What is the value of knowing that "either the DNS Administrator of the
> domain has not chosen to remove the Validation Record or that a new owner
> of the domain has re-introduced the Validation Record"?
>
> In my view, the core problem is that the draft is dancing around an
> unstated but essential requirement, for all DNS zones on the internet:
>
> 0. We define Validation-Controlling Entries (VCEs) as any records or
> delegations at underscore-prefixed or wildcard names.
> 1. Zone owners MUST NOT allow other parties to add or modify a VCE unless
> the owner name's next label is uniquely assigned to that party.
> 2. Zone owners MUST NOT add a VCE without understanding and approving its
> function.
> 3. When acquiring a zone, the new owner MUST promptly remove all VCEs
> whose function is not understood and approved.
>
> With these requirements in place, we can now speak about validation or
> authorization in a coherent way: adding a VCE demonstrates approval, so we
> can confirm approval by requesting a new VCE.  We can (and should) also
> talk about the real reasons that we recommend high-entropy tokens:
>
> * As the easiest way to ensure uniqueness in distributed ASP
> implementations.
> * As an optional mitigation for failures to comply with requirement #3.
> * To obfuscate certain vendor-specific identifiers.
> * To guard against entries accidentally placed in the wrong zone.
> * etc.
>
> --Ben
>
> ------------------------------
> *From:* John R Levine <johnl@taugh.com>
> *Sent:* Sunday, June 8, 2025 12:16 PM
> *To:* Erik Nygren <erik+ietf@nygren.org>
> *Cc:* dnsop@ietf.org <dnsop@ietf.org>
> *Subject:* [DNSOP] Re: [Ext] Persistence of DCV, including for Delegated
> DCV (for draft-ietf-dnsop-domain-verification-techniques)
>
>
>
> On Sun, 8 Jun 2025, Erik Nygren wrote:
> > Rather than saying "I authorize this action" in a one-off validation,
> > persistent validation is saying "I authorize this User/account"
>
> I don't see a useful difference.  Either way the entity issuing the token
> uses the unique token to identify whatever it is that it wants to verify.
>
> As I said before, I do not see any reason to make any technical changes
> here other than an option for the token to say it does not expire.  We can
> wave our hands about on-path attacker but since I've never seen one
> attacking a validation token, I'm not aware of any practice we can
> describe, and I do not want us to guess.
>
> Regards,
> John Levine, johnl@taugh.com, Taughannock Networks, Trumansburg NY
> Please consider the environment before reading this e-mail.
> https://urldefense.com/v3/__https://jl.ly__;!!Bt8RZUm9aw!9ExScallA0c6qWTIY0LOowCs2r3m3FqIUcAOawol_XK3gU9ZSnPWJj3xGJCWlbZMuqz7dEd2$
>
> _______________________________________________
> DNSOP mailing list -- dnsop@ietf.org
> To unsubscribe send an email to dnsop-leave@ietf.org
>