Re: [DNSOP] Question about usage of ip6.arpa and in-addr.arpa

Jim Reid <jim@rfc1035.com> Mon, 12 March 2018 23:41 UTC

Return-Path: <jim@rfc1035.com>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD3AF1250B8 for <dnsop@ietfa.amsl.com>; Mon, 12 Mar 2018 16:41:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o2mNcIirZOKd for <dnsop@ietfa.amsl.com>; Mon, 12 Mar 2018 16:41:12 -0700 (PDT)
Received: from shaun.rfc1035.com (shaun.rfc1035.com [93.186.33.42]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 845AE124F57 for <dnsop@ietf.org>; Mon, 12 Mar 2018 16:41:12 -0700 (PDT)
Received: from gromit.rfc1035.com (gromit.rfc1035.com [195.54.233.69]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by shaun.rfc1035.com (Postfix) with ESMTPSA id 6D1C9242147B; Mon, 12 Mar 2018 23:41:11 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
From: Jim Reid <jim@rfc1035.com>
In-Reply-To: <A111B1F1-2AD5-472B-A261-77E8E815E679@vpnc.org>
Date: Mon, 12 Mar 2018 23:41:10 +0000
Cc: dnsop WG <dnsop@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <F917A3E4-2F87-4670-8370-9DEA2E85D6B2@rfc1035.com>
References: <B7531E71-AC04-4D40-86B0-74F2DCA92446@letsencrypt.org> <0EE4F82D-AD7B-4D50-B415-6B5558B7E974@vpnc.org> <7B867A66-4B80-4070-ACA9-7C94A63FBC17@rfc1035.com> <A111B1F1-2AD5-472B-A261-77E8E815E679@vpnc.org>
To: Paul Hoffman <paul.hoffman@vpnc.org>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/dnsop/HwnmA_TDoQ6WP245K50SjX2D-v4>
Subject: Re: [DNSOP] Question about usage of ip6.arpa and in-addr.arpa
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Mar 2018 23:41:14 -0000


> On 12 Mar 2018, at 23:27, Paul Hoffman <paul.hoffman@vpnc.org> wrote:
> 
> For which other protocols did you want certificates with IP addresses as identifiers?

I think these may be needed for SIP, particularly roving (nameless) clients. And quite possibly for P2P applications.

> If your list is longer than zero, are you willing to help Roland with a solution using DNS records for validation that has any chance of being usable? 

Yes, I’d be willing to work with Roland on at least finding and documenting likely use cases. Are you? Whether we (or others) can then come up with something that has any chance of being usable is another matter.